Login / Signup
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode.
Takashi Adachi
Kazumasa Omote
Published in:
AsiaJCIS (2015)
Keyphrases
</>
evaluation method
security vulnerabilities
data sets
evaluation criteria
gold standard
evaluation methods
database
real time
databases
website
email
risk assessment
evaluation model
buffer overflow