نتایج جستجو برای: malicious
تعداد نتایج: 12653 فیلتر نتایج به سال:
Online Social Networks (OSNs) witness a rise in user activity whenever an event takes place. Malicious entities exploit this spur in user-engagement levels to spread malicious content that compromises system reputation and degrades user experience. It also generates revenue from advertisements, clicks, etc. for the malicious entities. Facebook, the world’s biggest social network, is no exceptio...
Gossip-based protocols are an e cient mechanism for man-aging pure unstructured peer-to-peer (P2P) networks. Such protocols are Newscast, Cyclone, Lbpcast, etc. They have overcome from several di culties of such P2P random overlay connection. Such difficulties are randomness, high churn rate, very large unstructured distributed net-work, etc. But the performance of all gossip-based protocols ha...
In maintenance field, prognostic is recognized as a key feature as the estimation of the remaining useful life of an equipment allows avoiding inopportune maintenance spending. However, it can be difficult to define and implement an adequate and efficient prognostic tool that includes the inherent uncertainty of the prognostic process. Within this frame, neuro-fuzzy systems are well suited for ...
Malicious Uniform Resource Locators (URLs), or malicious websites, are one of the most common threats to web security. They host unwanted content (spam, malware, inappropriate ads, scams, etc.) Your visit this website may have been prompted by emails, advertisements, searches links from other websites. Either way, user must click on URL. The growing prevalence phishing, spam, and malware has le...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید