Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,755,990 papers from all fields of science
Search
Sign In
Create Free Account
Page hijacking
Known as:
Pagejacking
, 302 Google Jacking
, Web page hijacking
Expand
Page hijacking Involves compromising legitimate web pages in order to redirect users to a malicious web site or an Exploit kit via XSS.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Clickjacking
Computer security
Cross-site scripting
CyberPatriot
Expand
Broader (3)
Cybercrime
Spamming
World Wide Web
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Launching and leading intense teams
S. Webber
,
David S. Webber
2015
Corpus ID: 5253351
2012
2012
Pragmatic Conservatism: A Defense
S. Vannatta
Humanitas
2012
Corpus ID: 142128367
<jats:p />
2012
2012
Concurrent prefix hijacks: occurrence and impacts
V. Khare
,
Q. Ju
,
Beichuan Zhang
ACM/SIGCOMM Internet Measurement Conference
2012
Corpus ID: 6015000
A concurrent prefix hijack happens when an unauthorized network originates IP prefixes of multiple other networks. Its extreme…
Expand
Review
2012
Review
2012
Visual analytics for BGP monitoring and prefix hijacking identification
E. Biersack
,
Quentin Jacquemart
,
+5 authors
Pierre-Antoine Vervier
IEEE Network
2012
Corpus ID: 16568089
The control plane of the Internet relies entirely on BGP as the interdomain routing protocol to maintain and exchange routing…
Expand
2012
2012
Comparative Study of Different Path Planning Algorithms: A Water based Rescue System
S. M. MasudurRahmanAl-Arif
,
A. Ferdous
,
Sohrab Hassan Nijami
2012
Corpus ID: 1780234
are many countries in the world where water is the main medium for earning livelihood and transportation. Such countries are…
Expand
2011
2011
BETWEEN WORLD HISTORY AND STATE FORMATION: NEW PERSPECTIVES ON AFRICA'S CITIES*
Laurent Fourchard
The Journal of African History
2011
Corpus ID: 73687061
ABSTRACT The dramatic urban change taking place on the African continent has led to a renewed and controversial interest in…
Expand
2009
2009
Research on Security Mechanisms of SIP-Based VoIP System
Liancheng Shan
,
Ning Jiang
Ninth International Conference on Hybrid…
2009
Corpus ID: 9093900
The SIP-based VoIP system is build on the IP network, so it is affected by the IP network security problem. SIP-based VoIP system…
Expand
2004
2004
Bringing the Party Back In: The ccp and the Trajectory of Market Transition in China
A. Shevchenko
2004
Corpus ID: 55925213
Review
2004
Review
2004
Parliamentary Representation of Minorities in Romania
CIPRIAN-CALIN Alionescu
2004
Corpus ID: 53462766
This article aims to analyse the mechanisms through which the parliamentary representation of ethnic minorities is ensured in…
Expand
Highly Cited
1998
Highly Cited
1998
Internet security attacks at the basic levels
M. Vivo
,
Gabriela O. de Vivo
,
G. Isern
OPSR
1998
Corpus ID: 164183
The Internet put the rest of the world at the reach of our computers. In the same way it also made our computers reachable by the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required