Results 1 to 10 of about 9,836,133 (374)
Research Articles in Simplified HTML: a Web-first format for HTML-based scholarly articles [PDF]
Purpose. This paper introduces the Research Articles in Simplified HTML (or RASH), which is a Web-first format for writing HTML-based scholarly papers; it is accompanied by the RASH Framework, a set of tools for interacting with RASH-based articles.
S. Peroni +6 more
semanticscholar +7 more sources
HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis [PDF]
Recently, the development and implementation of phishing attacks require little technical skills and costs. This uprising has led to an ever-growing number of phishing attacks on the World Wide Web.
C. Opara, Bo Wei, Yingke Chen
semanticscholar +4 more sources
Comparison of Web Scraping Techniques : Regular Expression, HTML DOM and Xpath
Data collection is the initial stage of research. There are various data sources on the internet that can be used in the research process. The process of taking data or information from sites on the internet is called web scraping.
Rohmat Gunawan +3 more
openalex +2 more sources
Understanding HTML with Large Language Models [PDF]
Large language models (LLMs) have shown exceptional performance on a variety of natural language tasks. Yet, their capabilities for HTML understanding -- i.e., parsing the raw HTML of a webpage, with applications to automation of web-based tasks ...
Izzeddin Gur +8 more
semanticscholar +1 more source
A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails. Phishing attacks steal users’ information
Sultan Asiri +4 more
semanticscholar +1 more source
An effective detection approach for phishing websites using URL and HTML features
Today's growing phishing websites pose significant threats due to their extremely undetectable risk. They anticipate internet users to mistake them as genuine ones in order to reveal user information and privacy, such as login ids, pass-words, credit ...
Ali Aljofey +6 more
semanticscholar +1 more source
Perancangan Sistem Absensi Pegawai Kantoran Secara Online pada Website Berbasis HTML dan CSS
Perkembangan teknologi yang terus menerus maju membuat segala sesuatu menjadi canggih dan mudah, seperti absensi yang dapat diakses secara online. Pada penelitian ini dilakukan perancangan sistem absensi pegawai kantoran secara online pada website ...
I. Sari +4 more
semanticscholar +1 more source
Phishing, a well-known cyber-attack practice has gained significant research attention in the cyber-security domain for the last two decades due to its dynamic attacking strategies.
Subhash Ariyadasa +2 more
semanticscholar +1 more source
HTML: Hierarchical Transformer-based Multi-task Learning for Volatility Prediction
The volatility forecasting task refers to predicting the amount of variability in the price of a financial asset over a certain period. It is an important mechanism for evaluating the risk associated with an asset and, as such, is of significant ...
Linyi Yang +3 more
semanticscholar +1 more source

