نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

2015
Tarcisio Souza Elena Demidova Thomas Risse Helge Holzmann Gerhard Gossen Julian Szymanski

Long-term Web archives comprise Web documents gathered over longer time periods and can easily reach hundreds of terabytes in size. Semantic annotations such as named entities can facilitate intelligent access to the Web archive data. However, the annotation of the entire archive content on this scale is often infeasible. The most efficient way to access the documents within Web archives is pro...

Journal: :CoRR 2005
Frank McCown Sheffan Chan Michael L. Nelson Johan Bollen

We explore the availability and persistence of URLs cited in articles published in D-Lib Magazine. We extracted 4387 unique URLs referenced in 453 articles published from July 1995 to August 2004. The availability was checked three times a week for 25 weeks from September 2004 to February 2005. We found that approximately 28% of those URLs failed to resolve initially, and 30% failed to resolve ...

Journal: :Journal of Sensor and Actuator Networks 2022

Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting spoofing/fake site that appears to be visual clone of legitimate site. Several Unicode characters are visually identical ASCII characters. This similarity generally known as homoglyphs. Malicious adversaries utilize homoglyphs URLs and DNS domains target organiza...

2002
Kasom Koht-arsa Surasak Sanguanpong

This paper describes a cluster-based high-performance web spider architecture. Its architecture has been designed for handling a very large number of web pages with both URLs contents compression. The method we used to fetch URLs has been designed for achieving maximum performance with respect to well-known spider’s considerations. In experiments, our spider achieves an average download rate of...

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

Journal: :C&RL 2011
Christopher C. Brown

Christopher C. Brown is Associate Professor and Reference Technology Integration Librarian at the University of Denver, Penrose Library; e-mail: [email protected]. © Christopher C. Brown As federal government information is increasingly migrating to online formats, libraries are providing links to this content via URLs or persistent URLs (PURLs) in their online public access catalogs (OPACs). Click...

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2016

Journal: :Pennsylvania Libraries: Research & Practice 2014

Journal: :Frontiers in Physics 2021

In early January 2020, after China reported the first cases of new coronavirus (SARS-CoV-2) in city Wuhan, unreliable and not fully accurate information has started spreading faster than virus itself. Alongside this pandemic, people have experienced a parallel infodemic, i.e., an overabundance information, some which is misleading or even harmful, widely spread around globe. Although social med...

2007
E. Guttman C. Perkins J. Kempf

The "service:" URL scheme name is used to define URLs (called "service: URLs" in this document) that are primarily intended to be used by the Service Location Protocol in order to distribute service access information. These schemes provide an extensible framework for client-based network software to obtain configuration information required to make use of network services. When registering a s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید