2021
DOI: 10.1002/int.22584
|View full text |Cite
|
Sign up to set email alerts
|

Taylor–HHO algorithm: A hybrid optimization algorithm with deep long short‐term for malicious JavaScript detection

Abstract: The security of information has become a major issue due to the development of network information-based technologies. The malicious script, like, JavaScript, is a major threat to computer networks in terms of network security. Here, the JavaScript allows the programmers not only to build advanced client-side interfaces for web-based applications but also utilized for carrying out attacks that may steal the user's confidential data.In addition, the attackers can easily induce malicious JavaScript into webpages… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…In the existing methods of building LSTM, most people set the initial parameters of the model randomly without a fixed pattern. It can result in the processing power of the neural network model not being fully utilized, and there are some studies on the parameters of the neural network to find the optimal values [31] [32] [33].…”
Section: Sca-hho-lstm Prediction Modelmentioning
confidence: 99%
“…In the existing methods of building LSTM, most people set the initial parameters of the model randomly without a fixed pattern. It can result in the processing power of the neural network model not being fully utilized, and there are some studies on the parameters of the neural network to find the optimal values [31] [32] [33].…”
Section: Sca-hho-lstm Prediction Modelmentioning
confidence: 99%
“…, 2017; Xingjian et al. , 2015) (Gandhmal and Kumar, 2021) (Scaria and Rajkumar, 2021) in which the affective-state prediction of the learners is performed. Deep LSTM is performed with the proposed RiderSSA and is obtained by integrating ROA and SSA.…”
Section: Proposed Riderssa-based Deep Lstm For Affective-state and Le...mentioning
confidence: 99%
“…Another choice to detecting malware is to use features obtained by monitoring program execution (Application Programming Interface [API] called, instructions executed, IP addresses accessed, etc.). These behavior analysis-based methods [6][7][8] usually have better performance compared with static analysis-based detection approaches. To further improve the performance, behavior analysis-based detection approaches employ graph models, such as network traffic and control flow, to describe the relationship between program entities.…”
Section: Introductionmentioning
confidence: 99%