Full-text articles, eBooks and much more from EBSCO Discovery Service

Not found what you are looking for? Check in Onleihe or make a Purchase Request

Showing 41 - 60 of 153

42

Equifax, TransUnion Hit by Malicious JavaScript Security Risk.
Kerner, Sean Michael
eWeek. 10/13/2017, p1-1. 1p.

INTERNET security JAVASCRIPT programming l... EQUIFAX Inc. TRANSUNION LLC MALWAREBYTES Inc.
Journal
Save to List
43

This result is not available to guest users.

45

Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics
Viszkok, Tamás ; Hegedűs, Péter ; Ferenc, Rudolf

Vulnerability prediction static source code metri... process metrics JavaScript security
Save to List
46

Fixing Vulnerabilities Automatically with Linters
Rafnsson, Willard ; Giustolisi, Rosario ; Kragerup, Mark ; et al.
Rafnsson, W, Giustolisi, R, Kragerup, M & Høyrup, M 2020, Fixing Vulnerabilities Automatically with Linters. in 14th International Conference on Network and System Security. Springer. https://doi.org/10.1007/978-3-030-65745-1

Static analysis Software vulnerabilities Mainstream programmers Linters JavaScript security
Academic journal
Save to List
47

WPAD: Waiting Patiently for an Announced Disaster
Boulila, Elyssa ; Dacier, Marc
ACM Computing Surveys (CSUR).

Academic journal
Save to List
49

Context-Aware Malicious Code Detection
Gu, Boxuan
http://rave.ohiolink.edu/etdc/view?acc_num=osu1354523604.

Computer Science intrusion detection malicious code detection web security javascript security smartphone security
Academic journal
Save to List
50

Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software
Phung, Phu

Software Engineering Computer Science security policy enforcem... JavaScript security web-application security vehicle software securit...
Save to List
52

Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content
Phung, P.H. ; Monshizadeh, M. ; Sridhar, M. ; et al.
IEEE Transactions on Dependable and Secure Computing IEEE Trans. Dependable and Secure Comput. Dependable and Secure Computing, IEEE Transactions on. 12(4):443-457 Aug, 2015

Academic journal
Save to List
53

Smart Web Solutions for Online Growth
Prof. Sakshi M. Rahangadale ; Prof. Prajakta D. Helonde ; Prof. Pallavi S. Bansod ; et al.

Academic journal
Save to List
54

Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis
Rapley, Adam ; Bellekens, Xavier ; Shepherd, Lynsay A. ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Save to List
55

Protecting Web Browser Extensions from JavaScript Injection Attacks
Barua, Anton ; Zulkernine, Mohammad ; Weldemariam, Komminist
2013 18th International Conference on Engineering of Complex Computer Systems Engineering of Complex Computer Systems (ICECCS), 2013 18th International Conference on. :188-197 Jul, 2013

Conference
Save to List
56

Hybrid security analysis of web JavaScript code via dynamic partial evaluation
Tripp, Omer ; Ferrara, Pietro ; Pistoia, Marco
Proceedings of the 2014 International Symposium on Software Testing and Analysis. :49-59

Conference
Save to List
57

Information Flow Control in WebKit's JavaScript Bytecode.
Bichhawat, Abhishek ; Rajani, Vineet ; Garg, Deepak ; et al.
Principles of Security & Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory & Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings; 2014, p159-178, 20p

Book
Save to List
59

네트워크의 보안성 강화를 위한 표준 정보보호 기술 분석. (Korean)
김봉한
Journal of Digital Convergence; Dec2015, Vol. 13 Issue 12, p193-202, 10p

Academic journal
Save to List
60

Semantics and Security Issues in JavaScript
Ducasse, Stéphane ; Petton, Nicolas ; Polito, Guillermo ; et al.

Computer Science - Progr...
Report
Save to List

Filter