نتایج جستجو برای: malicious web pages
تعداد نتایج: 255955 فیلتر نتایج به سال:
— Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This script code is accomplished in the circumstance of the client’s web ...
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
for years, search engines have been considered as one of the most frequently used information seeking tools through the web. efficiency, ease of use and search quality are the main factors for giving precedence over search engines. search quality is assessed based on the concept of page rank which is applied to scoring web documents. the structures designed for linkage among the pages of a site...
We present an execution-flow analysis for JavaScript programs running in a web browser to prevent Cross-site Scripting (XSS) attacks. We construct finite-state automata (FSA) to model the client-side behavior of Ajax applications under normal execution. Our system is deployed in proxy mode. The proxy analyzes the execution flow of client-side JavaScript before the requested web pages arrive at ...
At any given time, at least 2.4 million couples are planning their weddings. Couples get advice from loved ones, articles, television, and the Internet to plan their weddings. The Knot, an online wedding planning resource, helps couples plan their weddings with personalized online web-pages called bios. The amount of information varies in each bio, however some bios have enough information to h...
A web service is one of the most important Internet communications software services. Using fraudulent methods to get personal information becoming increasingly widespread these days. However, it makes our lives easier, leads numerous security vulnerabilities Internet’s private structure. Web phishing just many risks that services face. Phishing assaults are usually detected by experienced user...
Although the design goals of the browser were originally not at running applications or at displaying a number of small widgets on a single web page, today many web pages considerably benefit from being able to host small embedded applications as components. While the web is full such applications, they cannot be easily reused because of the same origin policy restrictions that were introduced ...
Internet attacks that use Web servers to exploit browser vulnerabilities to install malware programs are on the rise [D04,R04,B04,S05]. Several recent reports suggested that some companies may actually be building a business model around such attacks [IF05,R05]. Expensive, manual analyses for individually discovered malicious Web sites have recently emerged [F04,G05]. In this paper, we introduc...
P hishing is a form of online identity theft associated with both social engineering and technical subterfuge. Specifically, phishers attempt to trick Internet users into revealing sensitive or private information, such as their bank account and credit-card numbers. Unwary users are often lured to browse counterfeit Web sites through spoofed email, and they might easily be convinced that fake p...
with the increased confidence in the use of the internet and the world wide web, the number of electronic commerce (e-commerce) transactions is growing rapidly. therefore, finding useful patterns and rules of users’ behaviors has become the critical issue for e-commerce and can be used to tailor e-commerce services in order to successfully meet the customers’ needs. this paper proposes an appro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید