Login / Signup
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
Yuta Takata
Mitsuaki Akiyama
Takeshi Yagi
Takeo Hariu
Shigeki Goto
Published in:
IEICE Trans. Inf. Syst. (2016)
Keyphrases
</>
website
phishing attacks
query logs
web pages
countermeasures
security risks
digital images
automatically extracted
data corruption
search engine
traffic analysis
malicious users
detect malicious
detecting malicious
security threats
hidden information
computer security
web search