Results 191 to 200 of about 129,031 (251)
Identification of Malicious Web Pages with Static Heuristics
Malicious web pages that launch client-side attacks on web browsers have become an increasing problem in recent years. High-interaction client honeypots are security devices that can detect these malicious web pages on a network. However, high-interaction client honeypots are both resource-intensive and known to miss attacks.
Christian Seifert +2 more
openaire +2 more sources
Research on Web Page Staticize Technology in E-Commerce System
Dynamic webpage technology is widely used in web development, but for a large e-commerce system, it will bring huge workload to the server if access database frequently and create web page dynamically, thus the server may breakdown on this condition. In this paper, the author introduced the techniques of web page staticize, based on the design of an E ...
Xiao Jun Bai, Fu Dan Wu
openaire +2 more sources
A static shell based web page implementation method and application in Haier 3D printing platform
Web pages can be implemented through two common forms, e.g., static and dynamic. Static page displays information directly without being compiled on the server, thus its access speed is fast. The information in a dynamic page must be loaded priorly from the database.
Yaxin Hou, Ruichun Hou, Jiguang Yu
openaire +2 more sources
Static and Dynamic Scoring by Web Page Grouping
Web Search System exists to retrieve necessary information on the WWW space. However, these are not accuracy enough. Then, we propose the technique for using Web Page Grouping together with the link structure analysis, and aim at the improvement in accuracy. Our proposal is composed of four techniques.
H. Nakakubo, T. Sato
openaire +2 more sources
Malicious Web Pages Detection Using Static Analysis of URLs
Dharmaraj R. PATIL, J. B. PATIL
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
HTTP Steady Connections for Robust Web Acceleration
The Web Conference, 2023HTTP’s intrinsic request-and-response traffic pattern makes most web servers often idle, leaving a potential to accelerate page loads. We present the notion of HTTP steady connections, which fully utilizes the server’s available network bandwidth during ...
Sunjae Kim, Wonjun Lee
semanticscholar +1 more source
Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021In this paper, we studied the phishing problem from data analytics and AI-powered adversarial attacks perspectives. We evaluated several static and dynamic features that can be used as good models' predictors.
Alexander O'Mara +2 more
semanticscholar +1 more source
Incremental Web Application Testing Using Page Object
IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015Software testing is indispensable to assure software quality. Traditional software testing techniques are insufficient for modern web applications due to their unique characteristics, such as highly dynamic generation of web pages and interactions with ...
Ting Yu, Lei Ma, Cheng Zhang
semanticscholar +1 more source
An Efficient Mining Approach for Handling Web Access Sequences
International Journal of Computer Communication and Informatics, 2021The World Wide Web (WWW) becomes an important source for collecting, storing, and sharing the information. Based on the users query the traditional web page search approximately retrieves the related link and some of the search engines are Alta, Vista ...
N. R., Evangelin Sonia S.V
semanticscholar +1 more source
IEEE Internet of Things Journal
The diversity of Web configuration interfaces for Internet of Things (IoT) devices has exacerbated issues, such as inadequate permission controls and insecure interfaces, resulting in various vulnerabilities. Owing to the varying interface configurations
Jiahui Xiang +6 more
semanticscholar +1 more source
The diversity of Web configuration interfaces for Internet of Things (IoT) devices has exacerbated issues, such as inadequate permission controls and insecure interfaces, resulting in various vulnerabilities. Owing to the varying interface configurations
Jiahui Xiang +6 more
semanticscholar +1 more source

