Works matching DE "UNIFORM Resource Locators"
Results: 488
Web Archive Search as Research: Methodological and Theoretical Implications.
- Published in:
- Alexandria, 2014, v. 25, n. 1/2, p. 93, doi. 10.7227/ALX.0022
- By:
- Publication type:
- Article
Cool Web Sites.
- Published in:
- Law Library Journal, 2005, v. 97, n. 4, p. 721
- By:
- Publication type:
- Article
(322-326) Proposals to amend Article 30 and Recommendation 30A.
- Published in:
- Taxon, 2016, v. 65, n. 4, p. 906, doi. 10.12705/654.37
- By:
- Publication type:
- Article
Secure Short URL Generation Method that Recognizes Risk of Target URL.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 269, doi. 10.1007/s11277-016-3866-8
- By:
- Publication type:
- Article
Efficient Malicious Packet Capture Through Advanced DNS Sinkhole.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 21, doi. 10.1007/s11277-016-3443-1
- By:
- Publication type:
- Article
Web Citations Analysis of the JASSS: the First Ten Years.
- Published in:
- Journal of Artificial Societies & Social Simulation, 2011, v. 14, n. 4, p. 30, doi. 10.18564/jasss.1803
- Publication type:
- Article
MESSAGE PASSING USING CRYPTOGRAPHY AND STEGANOGRAPHY.
- Published in:
- i-Manager's Journal On Cloud Computing, 2021, v. 8, n. 1, p. 8, doi. 10.26634/jcc.8.1.18455
- By:
- Publication type:
- Article
Detecting Phishing Website using Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 6580
- By:
- Publication type:
- Article
Guardian Shield: A Machine Learning Approach for Proactive Malicious URL Detection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 4118
- By:
- Publication type:
- Article
Cybersecurity Advancements: A Comprehensive Survey of Machine Learning-based Preprocessing Techniques for Enhanced Website Phishing Detection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3453
- By:
- Publication type:
- Article
Detection of Phishing Websites using Machine Learning Algorithm.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 962
- By:
- Publication type:
- Article
Evaluation of Selected Supervised Machine Learning Models for Phishing Website Detection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 2011
- By:
- Publication type:
- Article
Phishing Attack Detection using NLP and Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 777
- By:
- Publication type:
- Article
Know URL: Machine Learning-based Chrome Extension for Detection of URL Phishing.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 499
- By:
- Publication type:
- Article
Free "Techie" Tips and Tools on the Web.
- Published in:
- AMWA Journal: American Medical Writers Association Journal, 2009, v. 24, n. 4, p. 198
- By:
- Publication type:
- Article
Detection of Forwarding-Based Malicious URLs in Online Social Networks.
- Published in:
- International Journal of Parallel Programming, 2016, v. 44, n. 1, p. 163, doi. 10.1007/s10766-014-0330-9
- By:
- Publication type:
- Article
eBF: an enhanced Bloom Filter for intrusion detection in IoT.
- Published in:
- Journal of Big Data, 2023, v. 10, n. 1, p. 1, doi. 10.1186/s40537-023-00790-9
- By:
- Publication type:
- Article
eGPS 1.0: comprehensive software for multi-omic and evolutionary analyses.
- Published in:
- National Science Review, 2019, v. 6, n. 5, p. 867, doi. 10.1093/nsr/nwz079
- By:
- Publication type:
- Article
The Latest Word.
- Published in:
- Seybold Report: Analyzing Publishing Technologies, 2019, v. 19, n. 12, p. 11
- Publication type:
- Article
Courting Repeat Business with Personalized Direct Marketing.
- Published in:
- 2016
- Publication type:
- Case Study
Personalized Advertising Takes a Step Forward.
- Published in:
- Seybold Report: Analyzing Publishing Technologies, 2012, v. 12, n. 10, p. 2
- By:
- Publication type:
- Article
A Comparative Analysis of Machine Learning Techniques for URL Phishing Detection.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 6, p. 18495, doi. 10.48084/etasr.8920
- By:
- Publication type:
- Article
Citation Styles and Systems.
- Published in:
- Turkish Journal of Plastic Surgery, 2019, v. 27, n. 2, p. 41, doi. 10.4103/1300-6878.255015
- By:
- Publication type:
- Article
Staking a claim on the dotbrand frontier: A brand perspective.
- Published in:
- Journal of Brand Strategy, 2012, v. 1, n. 2, p. 118, doi. 10.69554/noiy4287
- By:
- Publication type:
- Article
The social media cancer misinformation conundrum.
- Published in:
- CA: A Cancer Journal for Clinicians, 2022, v. 72, n. 1, p. 3, doi. 10.3322/caac.21710
- Publication type:
- Article
Converged multimedia services in emerging Web 2.0 session mobility scenarios.
- Published in:
- Wireless Networks (10220038), 2012, v. 18, n. 2, p. 185, doi. 10.1007/s11276-011-0394-z
- By:
- Publication type:
- Article
An ensemble learning approach for detecting phishing URLs in encrypted TLS traffic.
- Published in:
- Telecommunication Systems, 2024, v. 87, n. 4, p. 1015, doi. 10.1007/s11235-024-01229-z
- By:
- Publication type:
- Article
Permanence and Characteristics of URLs cited in the Journal Scientometrics: A Study Using PHP Script.
- Published in:
- International Journal of Information Dissemination & Technology, 2020, v. 10, n. 4, p. 201, doi. 10.5958/2249-5576.2020.00037.0
- By:
- Publication type:
- Article
An Enhanced Anti-Phishing Technique for Social Media Users: A Multilayer Q-Learning Approach.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 1, p. 18, doi. 10.14569/ijacsa.2024.0150103
- By:
- Publication type:
- Article
Strategies for Combating the Scourge of Digital Disinformation.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2021, v. 34, n. 2, p. 316, doi. 10.1080/08850607.2020.1789425
- By:
- Publication type:
- Article
Investigating IPTV Malware in the Wild.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 325, doi. 10.3390/fi15100325
- By:
- Publication type:
- Article
CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning.
- Published in:
- Future Internet, 2022, v. 14, n. 8, p. 229, doi. 10.3390/fi14080229
- By:
- Publication type:
- Article
Web Ontologies as Renewal of Classical Philosophical Ontology.
- Published in:
- Metaphilosophy, 2012, v. 43, n. 4, p. 396, doi. 10.1111/j.1467-9973.2012.01757.x
- By:
- Publication type:
- Article
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks.
- Published in:
- Journal of Computer Systems, Networks, & Communications, 2009, p. 1, doi. 10.1155/2009/383517
- By:
- Publication type:
- Article
THE RIGHT TO BE FORGOTTEN: THE BALANCE BETWEEN THE RIGHT TO PRIVACY AND FREEDOM OF EXPRESSION.
- Published in:
- European Review of Public Law, 2018, v. 30, n. 1, p. 213
- By:
- Publication type:
- Article
Using SFX to Identify Unexpressed User Needs.
- Published in:
- Collection Management, 2004, v. 29, n. 2, p. 7, doi. 10.1300/J105v29n0203
- By:
- Publication type:
- Article
An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL).
- Published in:
- PLoS ONE, 2024, v. 19, n. 5, p. 1, doi. 10.1371/journal.pone.0302196
- By:
- Publication type:
- Article
Correction: Structure Modeling of All Identified G Protein-Coupled Receptors in the Human Genome.
- Published in:
- 2006
- By:
- Publication type:
- Correction Notice
Who Is Retweeted in Times of Political Protest? An Analysis of Characteristics of Top Tweeters and Top Retweeted Users During the 2011 Egyptian Revolution.
- Published in:
- Atlantic Journal of Communication, 2015, v. 23, n. 2, p. 99, doi. 10.1080/15456870.2015.1013103
- By:
- Publication type:
- Article
Verify Your URLs!
- Published in:
- Journal of Extension, 2012, v. 50, n. 5, p. 11
- By:
- Publication type:
- Article
Improving OpenURL Metadata.
- Published in:
- Serials Librarian, 2009, v. 56, n. 1-4, p. 282, doi. 10.1080/03615260802690785
- By:
- Publication type:
- Article
Beyond Article Linking: Using OpenURL in Creative Ways.
- Published in:
- Serials Librarian, 2006, v. 50, n. 3-4, p. 221, doi. 10.1300/J123v50n03_03
- By:
- Publication type:
- Article
Everything You Always Wanted to Know About SFX but Were Afraid to Ask.
- Published in:
- Serials Librarian, 2004, v. 47, n. 1-2, p. 129, doi. 10.1300/J123v47n01_09
- By:
- Publication type:
- Article
Keeping Pace with Open URL: A Perspective.
- Published in:
- Serials Librarian, 2004, v. 47, n. 1-2, p. 117, doi. 10.1300/J123v47n01_08
- By:
- Publication type:
- Article
Get Organized! Part 1: Where Is That URL?
- Published in:
- Serials Librarian, 2004, v. 47, n. 1-2, p. 27, doi. 10.1300/J123v47n01_02
- By:
- Publication type:
- Article
Effective Optimization of Web Sites for Mobile Access: The Transition from eCommerce to mCommerce.
- Published in:
- Journal of Interactive Advertising, 2008, v. 9, n. 1, p. 1, doi. 10.1080/15252019.2008.10722149
- By:
- Publication type:
- Article
Korean and Chinese Webpage Content: Who Are Talking About What and How?
- Published in:
- Journal of Computer-Mediated Communication, 2012, v. 17, n. 2, p. 202, doi. 10.1111/j.1083-6101.2011.01571.x
- By:
- Publication type:
- Article
A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients.
- Published in:
- Journal of Computing & Information Technology, 2019, v. 27, n. 2, p. 41, doi. 10.20532/cit.2019.1004702
- By:
- Publication type:
- Article
Finding Reliable Information on the Web Should and Can Still Be Improved.
- Published in:
- Journal of Computing & Information Technology, 2018, v. 26, n. 1, p. 1, doi. 10.20532/cit.2018.1004240
- By:
- Publication type:
- Article
Phish Block: A Blockchain Framework for Phish Detection in Cloud.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 44, n. 1, p. 777, doi. 10.32604/csse.2023.024086
- By:
- Publication type:
- Article