Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
Botánica
2
Comercio electrónico
2
HTML (Lenguaje de marcado de documentos)
2
World Wide Web
2
Análisis del discurso
1
Análisis, apreciación
1
Aspectos ambientales
1
Capital humano
1
Ciencia
1
Cognición
1
Comedia
1
Condiciones económicas
1
Condiciones sociales
1
Conducta
1
Contaminación
1
Creación de programas
1
Cuentos españoles
1
Desarrollo de sitios Web
1
Diagnóstico conductual
1
Diseño
1
Dispositivos electromecánicos
1
Ecofisiología
1
Ecología química
1
Efectos de la educación en el mercado laboral
1
English language
1
España
1
Fenomenología
1
Feromonas
1
Filosofía de la Ciencia
1
Filósofos
1
-
1
-
2“…These websites often collect user data, and, without adequate cybersecurity measures such as the efficient detection and classification of malicious URLs, users’ sensitive information could be compromised. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
3“…Therefore, it is of paramount importance to accurately detect malicious URLs. Prior research has explored the use of deep-learning models to identify malicious URLs, using the segmentation of URL strings into character-level or word-level tokens, and embedding and employing trained models to differentiate between URLs. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
4
-
5“…Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
6“…OBJECTIVES: To develop “Urdu Receptive Language Scale (URLS)” for Urdu speaking Pakistani children of age 0-6 years. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
7
-
8“…Given only the URL of a Web page, can we identify its topic? We study this problem in detail by exploring a large number of different feature sets and algorithms on several datasets. …”
Enlace del recurso
Enlace del recurso
-
9“…Uniform Resource Locator (URL) is a unique identifier composed of protocol and domain name used to locate and retrieve a resource on the Internet. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
10por Nowak, Jakub, Holotyak, Taras, Korytkowski, Marcin, Scherer, Rafał, Voloshynovskiy, Slava“…In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
11“…BACKGROUND: Tobacco companies include on the packaging of their products URLs directing consumers to websites that contain protobacco messages. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
12por Aljofey, Ali, Jiang, Qingshan, Rasool, Abdur, Chen, Hui, Liu, Wenyin, Qu, Qiang, Wang, Yang“…The new features of this approach can be represented by URL character sequence without phishing prior knowledge, various hyperlink information, and textual content of the webpage, which are combined and fed to train the XGBoost classifier. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
13por Nagy, Naya, Aljabri, Malak, Shaahid, Afrah, Ahmed, Amnah Albin, Alnasser, Fatima, Almakramy, Linda, Alhadab, Manar, Alfaddagh, Shahad“…In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits such as stealing users’ personal and sensitive data, which can lead to financial loss, discredit, ransomware, or the spread of malicious infections and catastrophic cyber-attacks such as phishing attacks. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
14por Singh, Lisa, Bode, Leticia, Budak, Ceren, Kawintiranon, Kornraphop, Padden, Colton, Vraga, Emily“…This article investigates the prevalence of high and low quality URLs shared on Twitter when users discuss COVID-19. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
15“…OBJECTIVE: This study updates a 2009 study which examined uniform resource locator (URL) decay in health care management journals and seeks to determine whether continued URL availability relates to publication date, resource type, or top-level domain. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
16“…BACKGROUND: For years, Uniform Resource Locator (URL) decay or "link rot" has been a growing concern in the field of biomedical sciences. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Texto -
17por Zeng, Ping, Tan, Qingping, Meng, Xiankai, Shao, Zeming, Xie, Qinzheng, Yan, Ying, Cao, Wei, Xu, Jianjun“…In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. …”
Publicado 2017
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
18
-
19por Ghaleb, Fuad A., Alsaedi, Mohammed, Saeed, Faisal, Ahmad, Jawad, Alasli, Mohammed“…This study aims at improving the detection accuracy of malicious URL detection by designing and developing a cyber threat intelligence-based malicious URL detection model using two-stage ensemble learning. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
20“…Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto