نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

2006
Deepak P Deepak Khemani

Web pages are identified by their URLs. For authoritative web pages, pages that are focused on a specific topic, webmasters tend to use URLs which summarize the page. URL information is good for clustering because, they are small and ubiquitous, making techniques based on just URL information magnitudes faster than those which make use of the text content as well. We present a system that makes...

Journal: :Bioinformatics 2008
Jonathan D. Wren

MOTIVATION Internet-based electronic resources, as given by Uniform Resource Locators (URLs), are being increasingly used in scientific publications but are also becoming inaccessible in a time-dependant manner, a phenomenon documented across disciplines. Initial reports brought attention to the problem, spawning methods of effectively preserving URL content while some journals adopted policies...

Journal: :Circulation 2008

Journal: :ACM Transactions on Privacy and Security 2019

Journal: :Proceedings of the VLDB Endowment 2008

Journal: :Cadernos de Gestão e Empreendedorismo 2022

Esta investigação buscou analisar a acessibilidade dos sites que publicam vagas de emprego para PcD em empresas alagoanas. Para tanto, realizou-se um estudo caráter descritivo e exploratório natureza qualitativa. Os dados foram coletados com o auxílio da ferramenta AccessMonitor. Ficou evidenciado as URLs apresentam problemas os critérios não atendidos pelos estão relacionados sua maioria naveg...

Journal: :Archives of dermatology 2006
Jonathan D Wren Kathryn R Johnson David M Crockett Lauren F Heilig Lisa M Schilling Robert P Dellavalle

OBJECTIVES To describe dermatology journal uniform resource locator (URL) use and persistence and to better understand the level of control and awareness of authors regarding the availability of the URLs they cite. DESIGN Software was written to automatically access URLs in articles published between January 1, 1999, and September 30, 2004, in the 3 dermatology journals with the highest scien...

Journal: :Information Technology Journal 2012

Journal: :Sinkron : jurnal dan penelitian teknik informatika 2023

Steganography is the practice of hiding a message or information within another file, such as an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly available for intelligence gathering purposes. In this research, asymmetric key algorithm will be applied to steganography method, 10 images with different sizes and dimensions. Images tested are in tiff, gif,...

Journal: :Journal of Big Data 2023

Abstract Intrusion Detection is essential to identify malicious incidents and continuously alert many users of the Internet Things (IoT). The constant monitoring events generated from devices connected IoT extensive analysis every event based on predefined security policies consumes enormous resources. Accordingly, performance enhancement a crucial concern in other massive Big Data Applications...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید