Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Page hijacking

Known as: Pagejacking, 302 Google Jacking, Web page hijacking 
Page hijacking Involves compromising legitimate web pages in order to redirect users to a malicious web site or an Exploit kit via XSS.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
This paper proposes attack-resilient distributed control for synchronization of islanded, networked, inverter-based microgrids… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2011
Highly Cited
2011
In this study, we examine the abuse of online social networks at the hands of spammers through the lens of the tools, techniques… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2011
2011
We describe and evaluate a detection-based algorithm for tracking a variable number of dynamic targets online. The algorithm… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2011
Highly Cited
2011
Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Highly Cited
2010
Highly Cited
2010
In this paper we study the effect of false data injection attacks on state estimation carried over a sensor network monitoring a… Expand
  • figure 1
  • figure 2
Highly Cited
2008
Highly Cited
2008
This paper seeks to discover whether aviation security measures are cost-effective by considering their effectiveness, their cost… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2007
Highly Cited
2007
There have been many incidents of prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic… Expand
Highly Cited
2002
Highly Cited
2002
This paper addresses the identifier ownership problem. It does so by using characteristics of Statistic Uniqueness and… Expand
Highly Cited
2002
Highly Cited
2002
Buffer overflow attacks are the predominant threat to the secure operation of network and in particular, Internetbased… Expand
  • figure 1
  • figure 3
  • figure 4
  • table 1
  • table 2
Review
1997
Review
1997
Industrial Society is susceptibile to catastrophic events, including technological disasters and social and political crises… Expand