نتایج جستجو برای: url

تعداد نتایج: 13770  

2002
Chi-Chien Pan Tzao-Lin Lee Kai-Hsiang Yang

0. Abstract Proxy servers are more and more important today, and they provide web page caches for users to browse quickly, and also reduce unnecessary network traffic. However, users always can't browse web pages when the URL request is not correct. Sometimes we just want to know some subjects or information about some names without the exact URL, the proxy server couldn't help us at all. Most ...

2017
Jakub Puchýř Martin Holeňa

One of the key sources of spreading malware are malicious web sites – either tricking user to install malware imitating legitimate software or, in the case of various exploit kits, initiating malware installation even without any user action. The most common technique against such web sites is blacklisting. However, it provides little to no information about new sites never seen before. Therefo...

Journal: :JCS 2014
R. Rajalakshmi

Many term weighting methods are suggested in the literature for Information Retrieval and Text Categorization. Term weighting method, a part of feature selection process is not yet explored for URL classification problem. We classify a web page using its URL alone without fetching its content and hence URL based classification is faster than other methods. In this study, we investigate the use ...

2017

Social networks have become an essential part of the people?s communication system. They allow the users to express and share all the things they like with all the people they are connected with. However, this shared information can be dangerous for their privacy issues. In addition, there is some information that is not explicitly given but is implicit in the text of the posts that the user sh...

2005
Brian K. Horton

[1] Investigation of Cenozoic deformation, sediment accumulation, and provenance in the Eastern Cordillera of Bolivia at 17–21 S indicates major shortening (60–140 km) and foredeep development followed by limited internal shortening and intermontane basin development. Contrasting histories of shortening, deposition, sediment dispersal, and detrital composition distinguish a formerly extensive P...

2013
Guillermo Navarro-Arribas Daniel Abril Vicenç Torra

In this paper we introduce a k-anonymous vector space model, which can be used as an index of a set of confidential documents. This model allows to index, for example, encrypted data. New documents can be added or removed while maintaining the k-anonymity property of the vector space. URL http://dx.doi.org/10.1007/978-3-642-54568-9_23 [10] Source URL: https://www.iiia.csic.es/en/node/54461 Link...

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

2009
Suzan Verberne Max Hinne Maarten van der Heijden Eva D'hondt Wessel Kraaij Theo P. van der Weide

A number of recent studies have investigated the relation between URLs and associated query terms from search engine log files. In [5], the query terms associated with the domain of a URL were used as features for a URL classification task. The idea is that query terms that lead to successful classification of a URL are reliable semantic descriptors of the URL content. We follow up on this work...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید