Mostrando 1 - 20 Resultados de 32,714 Para Buscar '"URL"', tiempo de consulta: 0.51s Limitar resultados
  1. 1
  2. 2
    “…These websites often collect user data, and, without adequate cybersecurity measures such as the efficient detection and classification of malicious URLs, users’ sensitive information could be compromised. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 3
    por Su, Ming-Yang, Su, Kuan-Lin
    Publicado 2023
    “…Therefore, it is of paramount importance to accurately detect malicious URLs. Prior research has explored the use of deep-learning models to identify malicious URLs, using the segmentation of URL strings into character-level or word-level tokens, and embedding and employing trained models to differentiate between URLs. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 4
  5. 5
    por Kumi, Sandra, Lim, ChaeHo, Lee, Sang-Gon
    Publicado 2021
    “…Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  6. 6
    “…OBJECTIVES: To develop “Urdu Receptive Language Scale (URLS)” for Urdu speaking Pakistani children of age 0-6 years. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 7
  8. 8
    por Weber, I, Marian, L, Henzinger, M, Baykan, E
    Publicado 2011
    “…Given only the URL of a Web page, can we identify its topic? We study this problem in detail by exploring a large number of different feature sets and algorithms on several datasets. …”
    Enlace del recurso
    Enlace del recurso
  9. 9
    “…Uniform Resource Locator (URL) is a unique identifier composed of protocol and domain name used to locate and retrieve a resource on the Internet. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 10
    “…In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. …”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 11
    “…BACKGROUND: Tobacco companies include on the packaging of their products URLs directing consumers to websites that contain protobacco messages. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  12. 12
    “…The new features of this approach can be represented by URL character sequence without phishing prior knowledge, various hyperlink information, and textual content of the webpage, which are combined and fed to train the XGBoost classifier. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 13
    “…In today’s digitalized era, the world wide web services are a vital aspect of each individual’s daily life and are accessible to the users via uniform resource locators (URLs). Cybercriminals constantly adapt to new security technologies and use URLs to exploit vulnerabilities for illicit benefits such as stealing users’ personal and sensitive data, which can lead to financial loss, discredit, ransomware, or the spread of malicious infections and catastrophic cyber-attacks such as phishing attacks. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 14
    “…This article investigates the prevalence of high and low quality URLs shared on Twitter when users discuss COVID-19. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 15
    por Howell, Susan, Burtis, Amber
    Publicado 2022
    “…OBJECTIVE: This study updates a 2009 study which examined uniform resource locator (URL) decay in health care management journals and seeks to determine whether continued URL availability relates to publication date, resource type, or top-level domain. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 16
    por Ducut, Erick, Liu, Fang, Fontelo, Paul
    Publicado 2008
    “…BACKGROUND: For years, Uniform Resource Locator (URL) decay or "link rot" has been a growing concern in the field of biomedical sciences. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Texto
  17. 17
    “…In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 18
  19. 19
    “…This study aims at improving the detection accuracy of malicious URL detection by designing and developing a cyber threat intelligence-based malicious URL detection model using two-stage ensemble learning. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 20
    “…Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
Herramientas de búsqueda: RSS