نتایج جستجو برای: malicious urls
تعداد نتایج: 14279 فیلتر نتایج به سال:
One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization’s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is ...
abstract— peer-to-peer ( p2p ) systems have been the center of attention in recent years due to their advantage . since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . this paper investigates the use of genetic ...
This draft document is being circulated for comment. Please send your comments to the authors or to the mhtml mail list . If consensus is reached, this Access Type may be registered with IANA and this document may be submitted to the RFC editor as an Informational protocol specification. Internet Drafts are draft documents valid for a maximum of six months. They may be up...
Given only the URL of a web page, can we identify its language? This is the question that we examine in this paper. Such a language classifier is, for example, useful for crawlers of web search engines, which frequently try to satisfy certain language quotas. To determine the language of uncrawled web pages, they have to download the page, which might be wasteful, if the page is not in the desi...
Phishing refers to the fraudulent attempt obtain sensitive information such as a user's username and password, well details about checking account or credit card, for purpose of using that malevolent purposes. It's possible phishing scams are most common form cybercrime utilised today. attacks can be launched against victims in variety contexts, including online payment industry, webmail, finan...
Understanding influence plays a vital role in enhancing businesses operation and improving effect of information propagation. Therefore the user influence in social media, such as Twitter, is widely studied based on different standards, such as the number of followers, retweets and so on. However, little work considers the accurate click number of short URLs as the measurement of influence. In ...
This paper describes a Web filtering system “WebGuard,” which aims to automatically detect and filter adult content on the Web. WebGuard uses data mining techniques to classify URLs into two classes: suspect URLs and normal URLs. The suspect URLs are stored in a database, which is constantly and automatically updated in order to reflect the highly dynamic evolution of the Web. When working, Web...
During the past decade, the World Wide Web became the most popular network in the World. WWW grows with a very fast speed, thus the information that can be found through it is huge. In the early 90s, the first search engines for the WWW appeared. The user could give some keywords and the system returned a number of URLs (uniform resource locators) that contained the keywords. The order of the U...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید