نتایج جستجو برای: malicious urls

تعداد نتایج: 14279  

Journal: :Electronics 2023

Phishing leverages people’s tendency to share personal information online. attacks often begin with an email and can be used for a variety of purposes. The cybercriminal will employ social engineering techniques get the target click on link in phishing email, which take them infected website. These become more complex as hackers personalize their fraud provide convincing messages. malicious URL...

2007
Mortaza Kokabi

This paper present the design and function of magiran.com, a databse of periodicals published in Iran. It also attempts to answer the following questions: How many of the total periodicals published in Iran are covered by magiran? What is the subject coverage of the periodicals covered? Which subjects seem to have been given importance among the periodicals covered? How many of the periodicals ...

Journal: :مدیریت اطلاعات سلامت 0
محمد کریم صابری کارشناس ارشد، علوم کتابداری و اطلاع رسانی، دانشگاه آزاد اسلامی- واحد علوم و تحقیقات تهران، تهران، ایران علیرضا اسفندیاری مقدم استادیار، علوم کتابداری و اطلاع رسانی، دانشگاه آزاد اسلامی- واحد همدان، همدان، ایران.

introduction: web citations (urls) are at risk of decay and can be easily fade because of the variable and unstable nature of the internet. so, the purpose of this research was to assess web citation accessibility and decay of articles published in journal of the medical library association (jmla). methods: in this applied– descriptive study, jmla articles (231) in a seven year period (from 200...

Journal: :Computer Communications 2023

Malicious URL detection is an emerging research area due to the continuous modernization of various systems, for instance, Edge Computing. This article presents a novel malicious technique called deepBF (deep learning and Bloom Filter). presented in two-fold. Firstly, we propose learned Filter using 2-dimensional Filter. We experimentally decide best non-cryptography string hash function. Then,...

Journal: :Studia Universitatis Babes-Bolyai: Series Informatica 2023

"One of the most challenging categories threats circulating into online world is social engineering, with malicious web links, fake news, clickbait, and other tactics. Malware URLs are extremely dangerous because they represent main propagating vector for malware. Malicious links detection a task mechanism should not influence consumers’ experience. The proposed solutions must be sensitive enou...

Journal: :International Journal of Computers Communications & Control 2021

Web attackers aim to propagate malicious links using various techniques deceive users. They attempt control victims’ devices or obtain their passwords remotely, thereby acquiring access bank accounts, financial transactions, private and sensitive information they trade via the Internet. QR codes are accessible, free, easy use, can be scanned through several free apps on smartphones. As there is...

2017
Moritz Lipp Daniel Gruss Michael Schwarz David Bidner Clémentine Maurice Stefan Mangard

Keystrokes trigger interrupts which can be detected through software side channels to reconstruct keystroke timings. Keystroke timing attacks use these side channels to infer typed words, passphrases, or create user fingerprints. While keystroke timing attacks are considered harmful, they typically require native code execution to exploit the side channels and, thus, may not be practical in man...

2014
Martina Lindorfer Stamatis Volanis Alessandro Sisto Matthias Neugschwandtner Elias Athanasopoulos Federico Maggi Christian Platzer Stefano Zanero Sotiris Ioannidis

Compared to traditional desktop software, Android applications are delivered through software repositories, commonly known as application markets. Other mobile platforms, such as Apple iOS and BlackBerry OS also use the marketplace model, but what is unique to Android is the existence of a plethora of alternative application markets. This complicates the task of detecting and tracking Android m...

Journal: :CoRR 2017
Lukás Machlica Karel Bartos Michal Sofka

This paper proposes a generic classification system designed to detect security threats based on the behavior of malware samples. The system relies on statistical features computed from proxy log fields to train detectors using a database of malware samples. The behavior detectors serve as basic reusable building blocks of the multi-level detection architecture. The detectors identify malicious...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

ML-based Phishing URL (MLPU) detectors serve as the first level of defence to protect users and organisations from being victims phishing attacks. Lately, few studies have launched successful adversarial attacks against specific MLPU raising questions on their practical reliability usage. Nevertheless, robustness these systems has not been extensively investigated. Therefore, security vulnerabi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید