Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,884,435 papers from all fields of science
Search
Sign In
Create Free Account
Web threat
Known as:
Internet threats
, Web Threats
A web threat is any threat that uses the World Wide Web to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of which…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Attack (computing)
Blackhole exploit kit
Browser security
Countermeasure (computer)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A visualization cybersecurity method based on features' dissimilarity
Rabah AlShboul
,
F. Thabtah
,
Neda Abdelhamid
,
Mofleh Al-Diabat
Computers & security
2018
Corpus ID: 49584440
2014
2014
Dynamic & hybrid honeypot model for scalable network monitoring
Kartik Chawda
,
Ankit Patel
International Conference on Information…
2014
Corpus ID: 11666511
Advanced Technology in the area of intrusion detection is the Honeypot technology that unlike common IDS s tends to provide the…
Expand
2009
2009
Risks of the CardSpace Protocol
Sebastian Gajek
,
Jörg Schwenk
,
M. Steiner
,
Chen Xuan
Information Security Conference
2009
Corpus ID: 28192979
Microsoft has designed a user-centric identity metasystem encompassing a suite of various protocols for identity management…
Expand
2008
2008
Hacking as a service
Gunter Ollmann
2008
Corpus ID: 62133725
2008
2008
Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology
Olivier Thonnard
,
M. Dacier
IEEE International Conference on Data Mining…
2008
Corpus ID: 13922992
This paper describes a multi-dimensional knowledge discovery and data mining (KDD) methodology that aims at discovering…
Expand
2008
2008
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
Xun Wang
,
Wei Yu
,
Xinwen Fu
,
D. Xuan
,
Wei Zhao
IEEE INFOCOM - The 27th Conference on Computer…
2008
Corpus ID: 15907689
In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly…
Expand
2008
2008
Managing Quality Level for Developing Information Security System Adopting QFD
Pauline Kongsuwan
,
Sangmun Shin
,
Myeonggil Choi
Ninth ACIS International Conference on Software…
2008
Corpus ID: 18826957
An increase in internet threats forces organizations to integrate information security system into their fundamental systems…
Expand
2006
2006
Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats
Gregory P. Schaffer
IEEE Security and Privacy
2006
Corpus ID: 14650237
No longer satisfied with compromising and controlling individual computers, a new breed of hackers have set their sights on…
Expand
Highly Cited
2005
Highly Cited
2005
A Pointillist Approach for Comparing Honeypots
F. Pouget
,
Thorsten Holz
International Conference on Detection of…
2005
Corpus ID: 2841937
Our research focuses on the usage of honeypots for gathering detailed statistics on the Internet threats over a long period of…
Expand
2003
2003
Bayesian Learning Networks Approach to Cybercrime Detection
N. Abouzakhar
,
A. Gani
,
G. Manson
2003
Corpus ID: 14468125
The growing dependence of modern society on telecommunication and information networks has become inevitable. The increase in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE