A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

Threat intelligence computing

X Shu, F Araujo, DL Schales, MP Stoecklin… - Proceedings of the …, 2018 - dl.acm.org
Cyber threat hunting is the process of proactively and iteratively formulating and validating
threat hypotheses based on security-relevant observations and domain knowledge. To …

[HTML][HTML] Malicious JavaScript detection based on bidirectional LSTM model

X Song, C Chen, B Cui, J Fu - Applied Sciences, 2020 - mdpi.com
JavaScript has been widely used on the Internet because of its powerful features, and
almost all the websites use it to provide dynamic functions. However, these dynamic natures …

Blocking javascript without breaking the web: An empirical investigation

AH Amjad, Z Shafiq, MA Gulzar - arxiv preprint arxiv:2302.01182, 2023 - arxiv.org
Modern websites heavily rely on JavaScript (JS) to implement legitimate functionality as well
as privacy-invasive advertising and tracking. Browser extensions such as NoScript block any …

A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks

Y Wen, Y Huo, L Ma, T **g… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where
a primary base station sends a message to a primary user. Meanwhile, a secondary user …

A review of cloned mobile malware applications for android devices

M Baykara, E Çolak - … on digital forensic and security (ISDFS), 2018 - ieeexplore.ieee.org
With the increased mobile applications popularity, fraud methods have become a big
problem in this area. Every smartphone definitely has at least one mobile application. These …

Jsless: A tale of a fileless javascript memory-resident malware

S Saad, F Mahmood, W Briguglio, H Elmiligi - Information Security Practice …, 2019 - Springer
New computing paradigms, modern feature-rich programming languages and off-the-shelf
software libraries enabled the development of new sophisticated malware families …

Jsac: A novel framework to detect malicious javascript via cnns over ast and cfg

H Liang, Y Yang, L Sun, L Jiang - 2019 International Joint …, 2019 - ieeexplore.ieee.org
JavaScript (JS) is a dominant programming language in web/mobile development, while it is
also notoriously abused by attackers due to its powerful characteristics, eg, dynamic …

Behavior model construction for client side of modern web applications

W Wang, J Guo, Z Li, R Zhao - Tsinghua Science and …, 2020 - ieeexplore.ieee.org
Most of the behavior models with respect to Web applications focus on sequencing of
events, without regard for the changes of parameters or elements and the relationship …

Spider bird swarm algorithm with deep belief network for malicious JavaScript detection

S Alex, TD Rajkumar - Computers & Security, 2021 - Elsevier
JavaScript is employed in vast scenarios like web applications, NodeJS, and hybrid-mobile
applications. Moreover, JavaScript is a core component in the social network because of its …