نتایج جستجو برای: malicious web pages
تعداد نتایج: 255955 فیلتر نتایج به سال:
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection
With JavaScript and images at their disposal, web authors can create content that is immediately understandable to a person, but is beyond the direct analysis capability of computer programs, including security tools. Conversely, information can be deceiving for humans even if unable to fool a program. In this paper, we explore the discrepancies between user perception and program perception, u...
Objective: In order to identify users’ visual attention to left- and right-aligned menus on web pages, fixation count index (FCI) was assessed for both left and right menus using eye tracker to determine which menu is preferred by users in terms of visual attention. Methodology: In total, 116 pages with their menus aligned to left or right, classified into three groups, namely Persian pages, En...
Finding high-quality web pages is one of the most important tasks of search engines. The relevance between the documents found and the query searched depends on the user observation and increases the complexity of ranking algorithms. The other issue is that users often explore just the first 10 to 20 results while millions of pages related to a query may exist. So search engines have to use sui...
In recent years, managing the security over web has gained its importance. Use of appropriate handling techniques help to solve controversies and extract interesting scenarios based on content page. Many varieties vulnerabilities prevail Cross-Site Scripting (XSS) vulnerability is ranked among top ten risks found which a mandatory issue that requires solution. XSS injects malicious code in many...
One of the most famous methods for recommendation is user-based Collaborative Filtering (CF). This system compares active user’s items rating with historical rating records of other users to find similar users and recommending items which seems interesting to these similar users and have not been rated by the active user. As a way of computing recommendations, the ultimate goal of the user-ba...
A variety of attacks, including remote-code execution exploits, malware, and phishing, are delivered to users over the web. Users are lured to malicious websites in various ways, including through spam delivered over email and instant messages, and by links injected in search engines and popular benign websites. In response to such attacks, many initiatives, such as Google’s Safe Browsing, are ...
Online Social Networks (OSNs) witness a rise in user activity whenever an event takes place. Malicious entities exploit this spur in user-engagement levels to spread malicious content that compromises system reputation and degrades user experience. It also generates revenue from advertisements, clicks, etc. for the malicious entities. Facebook, the world’s biggest social network, is no exceptio...
Many contemporary Web sites incorporate third-party content in the form of advertisements, social-networking widgets, and maps. A number of sites like Facebook and Twitter also allow users to post comments that are then served to others, or allow users to add their own applications to the site. Such third-party content often comprises of executable code, commonly written in JavaScript, that run...
Background and Aim: Considering the potential damages caused by inaccurate, inadequate and incomplete information published in web pages, the aim of this study was to evaluate Persian-language web pages containing nutritional information, using Silberg criteria. Materials and Methods: Internet pages related to nutrition were found in “peyvandha.ir” and by searching 20 nutrition-related keywo...
expert discovery is a quest in search of finding an answer to a question: “who is the best expert of a specific subject in a particular domain within peculiar array of parameters?” expert with domain knowledge in any field is crucial for consulting in industry, academia and scientific community. aim of this study is to address the issues for expert-finding task in real-world community. collabor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید