Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Page hijacking

Known as: Pagejacking, 302 Google Jacking, Web page hijacking 
Page hijacking Involves compromising legitimate web pages in order to redirect users to a malicious web site or an Exploit kit via XSS.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper proposes attack-resilient distributed control for synchronization of islanded, networked, inverter-based microgrids… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
The Internet's tremendous success as well as our maturing realization of its architectural shortcomings have attracted… Expand
  • figure 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
In this study, we examine the abuse of online social networks at the hands of spammers through the lens of the tools, techniques… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper we study the effect of false data injection attacks on state estimation carried over a sensor network monitoring a… Expand
  • figure 1
  • figure 2
Is this relevant?
2008
2008
Notwithstanding the emphasis placed on the need for concerted international action to confront the problem of terrorism, positive… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
I first want to say a few words about the current G8 meeting, and then talk about major conflicts in the world. This will cover… Expand
Is this relevant?
2006
2006
Introduction: Markets, Communities and Empowerment Carolyn M. Elliott Part 1: Globalization and Neoliberal Governance 1… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper addresses the identifier ownership problem. It does so by using characteristics of Statistic Uniqueness and… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Buffer overflow attacks are the predominant threat to the secure operation of network and in particular, Internetbased… Expand
  • figure 1
  • figure 3
  • figure 4
  • table 1
  • table 2
Is this relevant?