Login / Signup

An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode.

Takashi AdachiKazumasa Omote
Published in: AsiaJCIS (2015)
Keyphrases
  • evaluation method
  • security vulnerabilities
  • data sets
  • evaluation criteria
  • gold standard
  • evaluation methods
  • database
  • real time
  • databases
  • website
  • email
  • risk assessment
  • evaluation model
  • buffer overflow