نتایج جستجو برای: malicious urls
تعداد نتایج: 14279 فیلتر نتایج به سال:
Web pages are identified by their URLs. For authoritative web pages, pages that are focused on a specific topic, webmasters tend to use URLs which summarize the page. URL information is good for clustering because, they are small and ubiquitous, making techniques based on just URL information magnitudes faster than those which make use of the text content as well. We present a system that makes...
MOTIVATION Internet-based electronic resources, as given by Uniform Resource Locators (URLs), are being increasingly used in scientific publications but are also becoming inaccessible in a time-dependant manner, a phenomenon documented across disciplines. Initial reports brought attention to the problem, spawning methods of effectively preserving URL content while some journals adopted policies...
Esta investigação buscou analisar a acessibilidade dos sites que publicam vagas de emprego para PcD em empresas alagoanas. Para tanto, realizou-se um estudo caráter descritivo e exploratório natureza qualitativa. Os dados foram coletados com o auxílio da ferramenta AccessMonitor. Ficou evidenciado as URLs apresentam problemas os critérios não atendidos pelos estão relacionados sua maioria naveg...
Uniform resource locator decay in dermatology journals: author attitudes and preservation practices.
OBJECTIVES To describe dermatology journal uniform resource locator (URL) use and persistence and to better understand the level of control and awareness of authors regarding the availability of the URLs they cite. DESIGN Software was written to automatically access URLs in articles published between January 1, 1999, and September 30, 2004, in the 3 dermatology journals with the highest scien...
Steganography is the practice of hiding a message or information within another file, such as an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly available for intelligence gathering purposes. In this research, asymmetric key algorithm will be applied to steganography method, 10 images with different sizes and dimensions. Images tested are in tiff, gif,...
Abstract Intrusion Detection is essential to identify malicious incidents and continuously alert many users of the Internet Things (IoT). The constant monitoring events generated from devices connected IoT extensive analysis every event based on predefined security policies consumes enormous resources. Accordingly, performance enhancement a crucial concern in other massive Big Data Applications...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید