نتایج جستجو برای: malicious web pages
تعداد نتایج: 255955 فیلتر نتایج به سال:
Expert discovery is a quest in search of finding an answer to a question: “Who is the best expert of a specific subject in a particular domain within peculiar array of parameters?” Expert with domain knowledge in any field is crucial for consulting in industry, academia and scientific community. Aim of this study is to address the issues for expert-finding task in real-world community. Collabor...
particulate and gaseous emissions of pollutants from industries and auto-exhausts are responsible for rising discomfort, aggravates respiratory and cardiovascular. in this study, a system for air quality information in tehran city has been developed, using an online web-based geographic information system. this web-based gis application allows users to recognize areas with a potential increase ...
Link Based approaches are among the most popular ranking approaches employed by search engines. They make use of the inherent linkage based structure of World Wide Web documents assigning each document an importance score. This importance score is based on the incoming links for a document; a document which is pointed to by many high quality documents should have a higher importance score. Goog...
It is attractive to extract parts of Web pages for the following two purposes. One is to clip parts of Web pages as we clip articles of newspapers. Another is to utilize information on Web pages by software. In this paper we define operations to extract parts of Web pages, namely path set operations. The operations are for both clipping of parts of Web pages and information extraction from Web ...
purpose: the aim of present study was the comparative evaluation of content and support quality of iranian academic libraries websites’ and provide recommendations to improve them.methodology: this study is an applied research and methodology was comparative survey. data gathering tools were three checklists extracted from relevant studies which compare with 5 foreign library websites, and thei...
The number of client-side attacks has grown significantly in the past few years, shifting focus away from defendable positions to a broad, poorly defended space filled with vulnerable clients. Just as honeypots enabled deep research into server-side attacks, honeyclients can permit the deep study of client-side attacks. A complement to honeypots, a honeyclient is a tool designed to mimic the be...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید