Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,979,030 papers from all fields of science
Search
Sign In
Create Free Account
Page hijacking
Known as:
Pagejacking
, 302 Google Jacking
, Web page hijacking
Expand
Page hijacking Involves compromising legitimate web pages in order to redirect users to a malicious web site or an Exploit kit via XSS.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Clickjacking
Computer security
Cross-site scripting
CyberPatriot
Expand
Broader (3)
Cybercrime
Spamming
World Wide Web
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The Use of Power Line Communication Technology for Electronic Relays of Car Alarms
A. Krasovsky
,
S. Vasyukov
,
I. Murzin
International Conference on Industrial…
2019
Corpus ID: 195698189
The growing number of hijackings with the use of special technical equipment makes actual the development of new types of…
Expand
2015
2015
Launching and leading intense teams
S. Webber
,
David S. Webber
2015
Corpus ID: 5253351
2012
2012
Pragmatic Conservatism: A Defense
S. Vannatta
Humanitas
2012
Corpus ID: 142128367
<jats:p />
2012
2012
Concurrent prefix hijacks: occurrence and impacts
V. Khare
,
Q. Ju
,
Beichuan Zhang
ACM/SIGCOMM Internet Measurement Conference
2012
Corpus ID: 6015000
A concurrent prefix hijack happens when an unauthorized network originates IP prefixes of multiple other networks. Its extreme…
Expand
2012
2012
Comparative Study of Different Path Planning Algorithms: A Water based Rescue System
S. M. MasudurRahmanAl-Arif
,
A. Ferdous
,
Sohrab Hassan Nijami
2012
Corpus ID: 1780234
are many countries in the world where water is the main medium for earning livelihood and transportation. Such countries are…
Expand
2009
2009
Automobile security concerns
R. Brooks
,
S. Sander
,
Juan Deng
,
J. Taiber
IEEE Vehicular Technology Magazine
2009
Corpus ID: 23483056
Automotive theft and hijacking are traditionally the major automobile security concerns. The Federal Bureau of Investigation (FBI…
Expand
2006
2006
Research and Design of Intelligent Vehicle Monitoring System Based on GPS/GSM
Qiang Liu
,
Huapu Lu
,
Hongliang Zhang
,
Bo Zou
International Conference on ITS…
2006
Corpus ID: 45567900
Based on the principle of the intelligent vehicle monitoring system using GPS/GSM, this paper analyzed the key technologies of…
Expand
2004
2004
Bringing the Party Back In: The ccp and the Trajectory of Market Transition in China
A. Shevchenko
2004
Corpus ID: 55925213
Review
2004
Review
2004
Parliamentary Representation of Minorities in Romania
CIPRIAN-CALIN Alionescu
2004
Corpus ID: 53462766
This article aims to analyse the mechanisms through which the parliamentary representation of ethnic minorities is ensured in…
Expand
2004
2004
`The counterfeit silly curr`: money, politics and the forging of royalist newspapers in the English civil war
J. Peacey
2004
Corpus ID: 153795764
(' THAT THE 1640S SAW THE EMERGENCE of mass popular print culture is now widely acknowledged. The explosion in the market for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE