Works about UNIFORM Resource Locators
Results: 478
Generative AI-based Phishing Text Generation Using Hybrid Prompt Design with Heuristic Algorithm for Multimodal Phishing Detection.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2025, v. 18, n. 2, p. 485, doi. 10.22266/ijies2025.0331.35
- By:
- Publication type:
- Article
INTERNET REVIEWS: LINKEDIN IN TEN.
- Published in:
- Kentucky Libraries, 2011, v. 75, n. 4, p. 30
- By:
- Publication type:
- Article
UNDERSTANDING OPENURL--A LINKING RESOLUTION.
- Published in:
- Kentucky Libraries, 2007, v. 71, n. 3, p. 10
- By:
- Publication type:
- Article
(322-326) Proposals to amend Article 30 and Recommendation 30A.
- Published in:
- Taxon, 2016, v. 65, n. 4, p. 906, doi. 10.12705/654.37
- By:
- Publication type:
- Article
Responsive Web Design: Online Marketing Mobility.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2014, v. 35, n. 10, p. 786
- By:
- Publication type:
- Article
Notes for Contributors.
- Published in:
- Mechanics of Composite Materials, 2021, v. 57, n. 1, p. 125, doi. 10.1007/s11029-021-09939-0
- Publication type:
- Article
NOTES FOR CONTRIBUTORS.
- Published in:
- Mechanics of Composite Materials, 2020, v. 56, n. 1, p. 131, doi. 10.1007/s11029-020-09867-5
- Publication type:
- Article
Notes for Contributors.
- Published in:
- 2019
- Publication type:
- Announcement
Weighted transformer neural network for web attack detection using request URL.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 15, p. 43983, doi. 10.1007/s11042-023-17356-9
- By:
- Publication type:
- Article
Understanding the impact of query expansion on federated search.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 10393, doi. 10.1007/s11042-023-15831-x
- By:
- Publication type:
- Article
Intelligent phishing website detection using machine learning.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 19, p. 29431, doi. 10.1007/s11042-023-14731-4
- By:
- Publication type:
- Article
Vaccination trials on hold: malicious and low credibility content on Twitter during the AstraZeneca COVID-19 vaccine development.
- Published in:
- Computational & Mathematical Organization Theory, 2023, v. 29, n. 3, p. 448, doi. 10.1007/s10588-022-09370-3
- By:
- Publication type:
- Article
Can 'YouTube' help students in learning surface anatomy?
- Published in:
- Surgical & Radiologic Anatomy, 2012, v. 34, n. 5, p. 465, doi. 10.1007/s00276-012-0935-x
- By:
- Publication type:
- Article
New Trends in ASL Variation Documentation.
- Published in:
- Sign Language Studies, 2021, v. 21, n. 3, p. N.PAG, doi. 10.1353/sls.2021.0003
- By:
- Publication type:
- Article
From the Editor-in-Chief: Featured Articles in the December 2023 Issue.
- Published in:
- Neurospine, 2023, v. 20, n. 4, p. 1093, doi. 10.14245/ns.2347284.642
- By:
- Publication type:
- Article
ZEKI: unsupervised zero-day exploit kit intelligence.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2020, v. 28, n. 4, p. 1859, doi. 10.3906/elk-1908-150
- By:
- Publication type:
- Article
I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2019, v. 27, n. 5, p. 3713, doi. 10.3906/elk-1810-199
- By:
- Publication type:
- Article
Beyond Single Sign-On: An in-depth look at single sign-on capabilites, how they work, and how they can be improved.
- Published in:
- ISSA Journal, 2021, v. 19, n. 3, p. 16
- By:
- Publication type:
- Article
Scraping EDGAR with Python.
- Published in:
- Journal of Education for Business, 2017, v. 92, n. 4, p. 179, doi. 10.1080/08832323.2017.1323720
- By:
- Publication type:
- Article
Internet Resources.
- Published in:
- Industrial Relations, 2006, v. 45, n. 4, p. 804, doi. 10.1111/j.1468-232X.2006.00452.x
- By:
- Publication type:
- Article
A Malicious Webpage Detection Method Based on Graph Convolutional Network.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 19, p. 3496, doi. 10.3390/math10193496
- By:
- Publication type:
- Article
Deep-Learning Based Injection Attacks Detection Method for HTTP.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 16, p. 2914, doi. 10.3390/math10162914
- By:
- Publication type:
- Article
Resource Description Language for Distributed RESTful Service Permission Management.
- Published in:
- TEM Journal, 2016, v. 5, n. 4, p. 538, doi. 10.18421/TEM54-19
- By:
- Publication type:
- Article
A systematic review of the implementation of healthy food retail interventions in settings with multiple food retail outlets (complex food retail settings).
- Published in:
- Journal of Nutritional Science, 2024, v. 13, p. 1, doi. 10.1017/jns.2024.52
- Publication type:
- Article
Machine learning approach for identifying suspicious uniform resource locators (URLs) on Reddit social network.
- Published in:
- African Journal of Science, Technology, Innovation & Development, 2022, v. 14, n. 6, p. 1618, doi. 10.1080/20421338.2021.1977087
- By:
- Publication type:
- Article
A Study of Availability and Recovery of URLs in Library and Information Science Scholarly journals.
- Published in:
- Asian Journal of Information Science & Technology (AJIST), 2020, v. 10, n. 1, p. 51, doi. 10.51983/ajist-2020.10.1.297
- By:
- Publication type:
- Article
Online Algebraic Tools for Teaching.
- Published in:
- Clearing House, 2011, v. 84, n. 6, p. 260, doi. 10.1080/00098655.2011.590553
- By:
- Publication type:
- Article
A lightweight and proactive rule-based incremental construction approach to detect phishing scam.
- Published in:
- Information Technology & Management, 2022, v. 23, n. 4, p. 271, doi. 10.1007/s10799-021-00351-7
- By:
- Publication type:
- Article
Geospatial big data: theory, methods, and applications.
- Published in:
- Annals of GIS, 2024, v. 30, n. 4, p. 411, doi. 10.1080/19475683.2024.2419749
- By:
- Publication type:
- Article
Investigating IPTV Malware in the Wild.
- Published in:
- Future Internet, 2023, v. 15, n. 10, p. 325, doi. 10.3390/fi15100325
- By:
- Publication type:
- Article
CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning.
- Published in:
- Future Internet, 2022, v. 14, n. 8, p. 229, doi. 10.3390/fi14080229
- By:
- Publication type:
- Article
AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 2, p. 248, doi. 10.3390/sym16020248
- By:
- Publication type:
- Article
A Lightweight Android Malware Classifier Using Novel Feature Selection Methods.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 5, p. 858, doi. 10.3390/sym12050858
- By:
- Publication type:
- Article
THE RIGHT TO BE FORGOTTEN: THE BALANCE BETWEEN THE RIGHT TO PRIVACY AND FREEDOM OF EXPRESSION.
- Published in:
- European Review of Public Law, 2018, v. 30, n. 1, p. 213
- By:
- Publication type:
- Article
New Web Version of International Slavic Librarians' Directory.
- Published in:
- Slavic & East European Information Resources, 2001, v. 2, n. 2, p. 33
- By:
- Publication type:
- Article
QR Codes - using mobile phones to deliver library instruction and help at the point of need.
- Published in:
- Journal of Information Literacy, 2010, v. 4, n. 1, p. 55, doi. 10.11645/4.1.1458
- By:
- Publication type:
- Article
Measuring the Human Factor of Cyber Security.
- Published in:
- Homeland Security Affairs, 2012, v. 8, p. 12
- By:
- Publication type:
- Article
Monkeypox goes viral: measuring the misinformation outbreak on Twitter.
- Published in:
- Journal of Infection in Developing Countries, 2022, v. 16, n. 7, p. 1218, doi. 10.3855/jidc.16907
- By:
- Publication type:
- Article
A Contextualized Meaning-Recall Vocabulary Testing Platform.
- Published in:
- JALT Journal, 2023, v. 47, n. 2, p. 211, doi. 10.37546/JALTJJ45.2-2
- By:
- Publication type:
- Article
Integrating diverse data into the coastal observation system COSYNA and EMODnet.
- Published in:
- 2018
- By:
- Publication type:
- Conference Paper/Materials
MIRIAM Resources: tools to generate and resolve robust cross-references in Systems Biology.
- Published in:
- BMC Systems Biology, 2007, v. 1, p. 58, doi. 10.1186/1752-0509-1-58
- By:
- Publication type:
- Article
Electronic Serials Usage Patterns as Observed at a Medium-Size University: Searches and Full-Text Downloads.
- Published in:
- Partnership: The Canadian Journal of Library & Information Practice & Research, 2008, v. 3, n. 1, p. 1, doi. 10.21083/partnership.v3i1.416
- By:
- Publication type:
- Article
Errata.
- Published in:
- 2009
- Publication type:
- Correction Notice
An update on Uniform Resource Locator (URL) decay in MEDLINE abstracts and measures for its mitigation.
- Published in:
- BMC Medical Informatics & Decision Making, 2008, v. 8, n. 1, p. 1, doi. 10.1186/1472-6947-8-23
- By:
- Publication type:
- Article
A cross disciplinary study of link decay and the effectiveness of mitigation techniques.
- Published in:
- BMC Bioinformatics, 2013, v. 14, n. Suppl 14, p. 1, doi. 10.1186/1471-2105-14-S14-S5
- By:
- Publication type:
- Article
Verify Your URLs!
- Published in:
- Journal of Extension, 2012, v. 50, n. 5, p. 11
- By:
- Publication type:
- Article
Improving OpenURL Metadata.
- Published in:
- Serials Librarian, 2009, v. 56, n. 1-4, p. 282, doi. 10.1080/03615260802690785
- By:
- Publication type:
- Article
Beyond Article Linking: Using OpenURL in Creative Ways.
- Published in:
- Serials Librarian, 2006, v. 50, n. 3-4, p. 221, doi. 10.1300/J123v50n03_03
- By:
- Publication type:
- Article
Keeping Pace with Open URL: A Perspective.
- Published in:
- Serials Librarian, 2004, v. 47, n. 1-2, p. 117, doi. 10.1300/J123v47n01_08
- By:
- Publication type:
- Article
Everything You Always Wanted to Know About SFX but Were Afraid to Ask.
- Published in:
- Serials Librarian, 2004, v. 47, n. 1-2, p. 129, doi. 10.1300/J123v47n01_09
- By:
- Publication type:
- Article