URL
4 Followers
Recent papers in URL
The low cost of communication and internet technology empower the common man to access various services online. But, these services are under watch of attackers who are trying to trick the online user by misleading or fake URLs. The URL... more
In this paper, we have discussed our skills in training and testing of a malicious uniform resource locator detecting system. there have been many trends in the technology and security which inspire our analysis. First, being online has... more
The purpose of this survey is to study the working of search engine using search engine optimization, web crawler and web mining. The large growth of World Wide Web (web) needs an efficient system that will manage the data over a web.... more
This paper is a finished study of various tools and strategies utilized for SEO. Search Engines which are utilized to discover any data crosswise over web. The primary goal of any site is to list at the top of all the links. Search Engine... more
Günümüzde kimlik avı (oltalama/phishing) saldırılarına çok sık rastlanmaktadır. Bu tür saldırılar insanların kişisel bilgilerini ele geçirmek ya da insanları dolandırmak amacıyla gerçekleştirilmektedir. Kimlik avı saldırılarının birden... more
Recently, long-term, advanced cyber-attacks targeting a specific enterprise or organization have been occurring again. These attacks occur over a long period and bypass detection by security systems unlike the existing attack pattern. For... more
Web Usage Mining (WUM) is the major application of data mining to the web data and analyzes the user's visiting activities and attains their interests by inspecting the web log files. The first and crucial step in WUM is preprocessing of... more
This paper describes a new interaction concept, which is based on customizable self-adhesive stickers with an integrated button, manufacturable at low cost. By pressing the button, users can execute specialized functionalities on their... more
The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites... more
The convergence of Web technology, wireless networks, and portable client devices provides new design opportunities for computer/communications systems. In the HP Labs' Cooltown project we have been exploring these opportunities... more
The traditional banking system, such as transactions over the counter using bank book is enhanced by adding the elements of electronic banking, where nowadays all transaction can be done over the network, because of globalization and the... more
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address... more
Workflow management is a serious concern in any organisation and a clinical laboratory is a particularly good example of where the information system (LIS) needs to be well integrated with the physical system comprising the doctors,... more
Web is a system of interlinked hypertext documents accessed via Internet. Internet is a global system of interconnected computer networks that serve billions of users worldwide. The huge amount of documents on the web is challenging for... more
This paper introduces the GVIS framework and describes one of its applications built in support of user profile awareness. This application is aimed at opening part of users' profiles to their inspection by exploiting a graphical... more