Skip to search formSkip to main contentSkip to account menu

Page hijacking

Known as: Pagejacking, 302 Google Jacking, Web page hijacking 
Page hijacking Involves compromising legitimate web pages in order to redirect users to a malicious web site or an Exploit kit via XSS.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
This paper proposes attack-resilient distributed control for synchronization of islanded, networked, inverter-based microgrids… 
Highly Cited
2016
Highly Cited
2016
Monitoring critical infrastructures is highly dependent on the accuracy of the installed sensors and the robustness of estimation… 
Highly Cited
2012
Highly Cited
2012
In this study, we discover a new class of unknown side channels --- "sequence-number-dependent" host packet counters --- that… 
Highly Cited
2011
Highly Cited
2011
In this study, we examine the abuse of online social networks at the hands of spammers through the lens of the tools, techniques… 
Highly Cited
2011
Highly Cited
2011
Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a… 
Highly Cited
2010
Highly Cited
2010
In this paper we study the effect of false data injection attacks on state estimation carried over a sensor network monitoring a… 
2006
2006
Owing to the inter-domain aspects of BGP routing, it is difficult to correlate information across multiple domains in order to… 
Highly Cited
2002
Highly Cited
2002
This paper addresses the identifier ownership problem. It does so by using characteristics of Statistic Uniqueness and… 
Highly Cited
2002
Highly Cited
2002
Buffer overflow attacks are the predominant threat to the secure operation of network and in particular, Internetbased… 
Review
1997
Review
1997
Industrial Society is susceptibile to catastrophic events, including technological disasters and social and political crises…