نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

2004
Dick Brackney Terrance Goan Allen Ott Lockheed Martin

One of the most critical problems facing the information security community is the threat of a malicious insider abusing his computer privileges to modify, remove, or prevent access to an organization’s data. An insider is considered trusted (at least implicitly) by his organization because he is granted access to its computing environment. Whether or not that insider is in fact trustworthy is ...

Journal: :International Journal of Engineering & Technology 2018

Journal: :journal of advances in computer engineering and technology 2015
mahdi sattarivand

abstract— peer-to-peer ( p2p ) systems have been the center of attention in recent years due to their advantage . since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . this paper investigates the use of genetic ...

1996

This draft document is being circulated for comment. Please send your comments to the authors or to the mhtml mail list . If consensus is reached, this Access Type may be registered with IANA and this document may be submitted to the RFC editor as an Informational protocol specification. Internet Drafts are draft documents valid for a maximum of six months. They may be up...

Journal: :PVLDB 2008
Eda Baykan Monika Henzinger Ingmar Weber

Given only the URL of a web page, can we identify its language? This is the question that we examine in this paper. Such a language classifier is, for example, useful for crawlers of web search engines, which frequently try to satisfy certain language quotas. To determine the language of uncrawled web pages, they have to download the page, which might be wasteful, if the page is not in the desi...

Journal: :The Philippine statistician (Quezon City) 2021

Phishing refers to the fraudulent attempt obtain sensitive information such as a user's username and password, well details about checking account or credit card, for purpose of using that malevolent purposes. It's possible phishing scams are most common form cybercrime utilised today. attacks can be launched against victims in variety contexts, including online payment industry, webmail, finan...

Journal: :JNW 2013
Chunjing Xiao Yuhong Zhang Xue Zeng Yue Wu

Understanding influence plays a vital role in enhancing businesses operation and improving effect of information propagation. Therefore the user influence in social media, such as Twitter, is widely studied based on different standards, such as the number of followers, retweets and so on. However, little work considers the accurate click number of short URLs as the measurement of influence. In ...

2005
Mohamed Hammami

This paper describes a Web filtering system “WebGuard,” which aims to automatically detect and filter adult content on the Web. WebGuard uses data mining techniques to classify URLs into two classes: suspect URLs and normal URLs. The suspect URLs are stored in a database, which is constantly and automatically updated in order to reflect the highly dynamic evolution of the Web. When working, Web...

2007
Antonis Sidiropoulos Dimitrios Katsaros Yannis Manolopoulos

During the past decade, the World Wide Web became the most popular network in the World. WWW grows with a very fast speed, thus the information that can be found through it is huge. In the early 90s, the first search engines for the WWW appeared. The user could give some keywords and the system returned a number of URLs (uniform resource locators) that contained the keywords. The order of the U...

Journal: :Journal of Robotics, Networking and Artificial Life 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید