Results 121 to 130 of about 1,665,774 (176)
Some of the next articles are maybe not open access.

TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step Classifiers

International Conference on Networking and Network Applications, 2017
Nowadays, with the rapid development of the Internet and the growing network business, the amount of the websites is experiencing an explosive growth and the malicious websites threaten is becoming the biggest threaten in the Internet age.
Zheng-Qun Wang   +4 more
semanticscholar   +1 more source

Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages

2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021
In this paper, we studied the phishing problem from data analytics and AI-powered adversarial attacks perspectives. We evaluated several static and dynamic features that can be used as good models' predictors.
Alexander O'Mara   +2 more
semanticscholar   +1 more source

An effective web page reorganization through heap tree and farthest first clustering approach

2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), 2017
Web usage mining is used to extract interesting and useful information from a web server log file. The log file is automatically stored in web server. It contains details about the web user activity on the website.
K. Shyamala, S. Kalaivani
semanticscholar   +1 more source

Testing and analysis of web applications using page models

International Symposium on Software Testing and Analysis, 2017
Web applications are difficult to analyze using code-based tools because data-flow and control-flow through the application occurs via both server-side code and client-side pages.
Snigdha Athaiya
semanticscholar   +1 more source

An Efficient Mining Approach for Handling Web Access Sequences

International Journal of Computer Communication and Informatics, 2021
The World Wide Web (WWW) becomes an important source for collecting, storing, and sharing the information. Based on the users query the traditional web page search approximately retrieves the related link and some of the search engines are Alta, Vista ...
N. R., Evangelin Sonia S.V
semanticscholar   +1 more source

Inferring page models for web application analysis

International Symposium on Software Testing and Analysis, 2017
Web applications are difficult to analyze using code-based tools because data-flow and control-flow through the application occurs via both server-side code and client-side pages.
Snigdha Athaiya
semanticscholar   +1 more source

Incremental Web Application Testing Using Page Object

IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015
Software testing is indispensable to assure software quality. Traditional software testing techniques are insufficient for modern web applications due to their unique characteristics, such as highly dynamic generation of web pages and interactions with ...
Ting Yu, Lei Ma, Cheng Zhang
semanticscholar   +1 more source

IMFLer: A Web Application for Interactive Metabolic Flux Analysis and Visualization

J. Comput. Biol., 2021
Increasing genome-wide data in biological sciences and medicine has contributed to the development of a variety of visualization tools. Several automatic, semiautomatic, and manual visualization tools have already been developed.
R. Petrovs, E. Stalidzans, A. Pentjuss
semanticscholar   +1 more source

LiveThumbs: a visual aid for web page revisitation

CHI Extended Abstracts, 2013
One problem web users often face is that of remembering which previously visited page is likely to contain some particular piece of information they are now interested in.
Luis A. Leiva   +2 more
semanticscholar   +1 more source

Deception Through Cloning against Web Site Attacks

International Conference on Information Security and Cryptology, 2021
In this study, a deception-based solution to the web site attacks is proposed. No fake entity is created to attract the intruders. The suggested solution involves cloning the web site under attack after the intrusion is detected and diverting the ...
Murat Arslan   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy