Page hijacking

Known as: Pagejacking, 302 Google Jacking, Web page hijacking 
Page hijacking Involves compromising legitimate web pages in order to redirect users to a malicious web site or an Exploit kit via XSS.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The Border Gateway Protocol (BGP) was designed without security in mind. Until today, this fact makes the Internet vulnerable to… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2011
2011
We describe and evaluate a detection-based algorithm for tracking a variable number of dynamic targets online. The algorithm… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Multi-touch tracking algorithm requires maintaining separate identities for multi-touch points, however, it fails when… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper we study the effect of false data injection attacks on state estimation carried over a sensor network monitoring a… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates an IP prefix that the router does not… (More)
  • table 1
  • figure 1
  • figure 2
  • table 3
  • figure 3
Is this relevant?
2007
2007
BitTorrent is currently one of the most popular peer-to-pee r systems. BitTorrent clients are widely spread all over the world… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper addresses the identifier ownership problem. It does so by using characteristics of Statistic Uniqueness and… (More)
Is this relevant?
1999
1999
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1998
1998
The Internet put the rest of the world at the reach of our computers. In the same way it also made our computers reachable by the… (More)
  • figure 1
  • figure 2
Is this relevant?