Results 121 to 130 of about 1,665,774 (176)
Some of the next articles are maybe not open access.
TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step Classifiers
International Conference on Networking and Network Applications, 2017Nowadays, with the rapid development of the Internet and the growing network business, the amount of the websites is experiencing an explosive growth and the malicious websites threaten is becoming the biggest threaten in the Internet age.
Zheng-Qun Wang+4 more
semanticscholar +1 more source
Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021In this paper, we studied the phishing problem from data analytics and AI-powered adversarial attacks perspectives. We evaluated several static and dynamic features that can be used as good models' predictors.
Alexander O'Mara+2 more
semanticscholar +1 more source
An effective web page reorganization through heap tree and farthest first clustering approach
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), 2017Web usage mining is used to extract interesting and useful information from a web server log file. The log file is automatically stored in web server. It contains details about the web user activity on the website.
K. Shyamala, S. Kalaivani
semanticscholar +1 more source
Testing and analysis of web applications using page models
International Symposium on Software Testing and Analysis, 2017Web applications are difficult to analyze using code-based tools because data-flow and control-flow through the application occurs via both server-side code and client-side pages.
Snigdha Athaiya
semanticscholar +1 more source
An Efficient Mining Approach for Handling Web Access Sequences
International Journal of Computer Communication and Informatics, 2021The World Wide Web (WWW) becomes an important source for collecting, storing, and sharing the information. Based on the users query the traditional web page search approximately retrieves the related link and some of the search engines are Alta, Vista ...
N. R., Evangelin Sonia S.V
semanticscholar +1 more source
Inferring page models for web application analysis
International Symposium on Software Testing and Analysis, 2017Web applications are difficult to analyze using code-based tools because data-flow and control-flow through the application occurs via both server-side code and client-side pages.
Snigdha Athaiya
semanticscholar +1 more source
Incremental Web Application Testing Using Page Object
IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015Software testing is indispensable to assure software quality. Traditional software testing techniques are insufficient for modern web applications due to their unique characteristics, such as highly dynamic generation of web pages and interactions with ...
Ting Yu, Lei Ma, Cheng Zhang
semanticscholar +1 more source
IMFLer: A Web Application for Interactive Metabolic Flux Analysis and Visualization
J. Comput. Biol., 2021Increasing genome-wide data in biological sciences and medicine has contributed to the development of a variety of visualization tools. Several automatic, semiautomatic, and manual visualization tools have already been developed.
R. Petrovs, E. Stalidzans, A. Pentjuss
semanticscholar +1 more source
LiveThumbs: a visual aid for web page revisitation
CHI Extended Abstracts, 2013One problem web users often face is that of remembering which previously visited page is likely to contain some particular piece of information they are now interested in.
Luis A. Leiva+2 more
semanticscholar +1 more source
Deception Through Cloning against Web Site Attacks
International Conference on Information Security and Cryptology, 2021In this study, a deception-based solution to the web site attacks is proposed. No fake entity is created to attract the intruders. The suggested solution involves cloning the web site under attack after the intrusion is detected and diverting the ...
Murat Arslan+2 more
semanticscholar +1 more source