Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   33  
      Information TechnologyComputer LiteracyMediaMobile Computing
    • by 
    •   8  
      Information SecurityMachine LearningData MiningFuzzy Logic
    • by 
    •   48  
      Information TechnologyEconomicsPolitical EconomyGlobalization
The low cost of communication and internet technology empower the common man to access various services online. But, these services are under watch of attackers who are trying to trick the online user by misleading or fake URLs. The URL... more
    • by 
    •   5  
      FraudCyber SecurityPhishingURL
    • by 
    •   18  
      Distributed ComputingUbiquitous ComputingComputer NetworksLocation-Awareness
    • by 
    •   15  
      Human RightsAccessibilityLeadershipRadio
    • by 
    •   28  
      MarketingInformation TechnologyManufacturingMultimedia
In this paper, we have discussed our skills in training and testing of a malicious uniform resource locator detecting system. there have been many trends in the technology and security which inspire our analysis. First, being online has... more
    • by 
    •   6  
      Machine LearningWeb MiningLogistic RegressionURL
    • by 
    •   60  
      EntrepreneurshipPovertyTelecommunicationsInterest
    • by 
    •   7  
      Information SystemsDistributed ComputingLibrary and Information StudiesURL
    • by 
    •   7  
      Computer ScienceRFIDSpecial functionsMobile phone
    • by 
    •   21  
      StakeholdersStatistical AnalysisCustomer SatisfactionCustomer Loyalty
The purpose of this survey is to study the working of search engine using search engine optimization, web crawler and web mining. The large growth of World Wide Web (web) needs an efficient system that will manage the data over a web.... more
    • by 
    •   6  
      Web MiningSearch EnginesSearch Engine OptimizationWorld Wide Web
This paper is a finished study of various tools and strategies utilized for SEO. Search Engines which are utilized to discover any data crosswise over web. The primary goal of any site is to list at the top of all the links. Search Engine... more
    • by 
    •   8  
      Computer ScienceWeb MiningSearch EnginesSearch Engine Optimization
As a global network of networks, the Internet is nowadays one of the most important tools for cultural and information exchange. With its increasing popularity, the Internet is used by more and more people from different cultural and... more
    • by  and +1
    •   11  
      Domain NamesLanguage and ScriptsThe InternetDNS system
Günümüzde kimlik avı (oltalama/phishing) saldırılarına çok sık rastlanmaktadır. Bu tür saldırılar insanların kişisel bilgilerini ele geçirmek ya da insanları dolandırmak amacıyla gerçekleştirilmektedir. Kimlik avı saldırılarının birden... more
    • by 
    •   5  
      Machine LearningPhishingURLMakine öğrenmesi
Multiple URLs belonging to the same purpose can become cumbersome to display, share, and handle. In this paper we describe MergeURL, an n-tier application to merge and shorten multiple URLs instantly overcoming the barriers of... more
    • by  and +2
    •   18  
      MathematicsComputer ScienceInformation TechnologyTechnology
    • by  and +2
    •   8  
      HumansANOVAURLInformation Storage and Retrieval
    • by 
    •   72  
      ArtXMLPDFACL
    • by 
    •   69  
      ArtXMLPDFACL
    • by 
    •   33  
      Information TechnologyManufacturingMultimediaTelecommunications
Recently, long-term, advanced cyber-attacks targeting a specific enterprise or organization have been occurring again. These attacks occur over a long period and bypass detection by security systems unlike the existing attack pattern. For... more
    • by 
    •   12  
      Intelligent Vehicular networksNext Generation Intelligent NetworksIntelligent NetworkingURL
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking... more
    • by  and +2
    •   10  
      Network SecurityInternet BankingBanking & Financial ServicesAuthentication
    • by 
    •   14  
      HumansURLClinical SciencesMyocardial Infarction
    • by 
    •   15  
      Distributed ComputingComputer NetworksLocation-AwarenessWireless networks
    • by 
    •   10  
      Computer NetworksSearch Engine Result PageSemantic Search EngineSearch Engines
Web Usage Mining (WUM) is the major application of data mining to the web data and analyzes the user's visiting activities and attains their interests by inspecting the web log files. The first and crucial step in WUM is preprocessing of... more
    • by 
    •   5  
      Web Usage MiningURLWeb ServerWeb Logs
    • by 
    •   7  
      LawResilienceReal TimeURL
The one of the most time consuming steps for association rule mining is the computation of the frequency of the occurrences of itemsets in the database. The hash table index approach converts a transaction database to an hash index tree... more
    • by  and +1
    •   25  
      Web MiningData Mining, Data Storage and duplication and Web Development.Web architecture and Web miningICT for Smart Environments, Mobile Spatial Interaction (MSI), Sensor Web Data Mining
    • by 
    •   7  
      WebHTMLWorld Wide WebURL
This paper describes a new interaction concept, which is based on customizable self-adhesive stickers with an integrated button, manufacturable at low cost. By pressing the button, users can execute specialized functionalities on their... more
    • by 
    •   7  
      Computer ScienceRFIDSpecial functionsMobile phone
The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites... more
    • by 
    •   6  
      Information SecurityMachine LearningComputer SecurityDeep Learning
    • by 
    • URL
The convergence of Web technology, wireless networks, and portable client devices provides new design opportunities for computer/communications systems. In the HP Labs' Cooltown project we have been exploring these opportunities... more
    • by 
    •   19  
      Distributed ComputingUbiquitous ComputingComputer NetworksLocation-Awareness
    • by 
    •   11  
      Kidney diseasesHumansCoefficient of VariationURL
The traditional banking system, such as transactions over the counter using bank book is enhanced by adding the elements of electronic banking, where nowadays all transaction can be done over the network, because of globalization and the... more
    • by 
    •   6  
      Mobile ApplicationsURLProcess Innovation in LogisticsHTTP Streaming
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address... more
    • by 
    •   19  
      RoutingWireless Mesh NetworksMANET Routing protocolsWireless networks
    • by 
    •   32  
      Information SystemsMicrofinanceProductivityDeveloping Countries
    • by 
    •   18  
      Information RetrievalVisualizationResource AllocationUser Interface
    • by 
    •   18  
      Distributed ComputingUbiquitous ComputingComputer NetworksLocation-Awareness
    • by  and +1
    •   19  
      HumansFemaleMaleROC Curve
    • by 
    •   6  
      Computer ScienceSearch EnginesMobile AgentsURL
    • by 
    • URL
Workflow management is a serious concern in any organisation and a clinical laboratory is a particularly good example of where the information system (LIS) needs to be well integrated with the physical system comprising the doctors,... more
    • by 
    •   19  
      Biomedical EngineeringDecision MakingMultimediaFlow Control
    • by 
    •   11  
      BusinessNetwork SecurityInternet BankingBanking & Financial Services
Web is a system of interlinked hypertext documents accessed via Internet. Internet is a global system of interconnected computer networks that serve billions of users worldwide. The huge amount of documents on the web is challenging for... more
    • by 
    •   5  
      Computer ScienceWebSearch EngineURL
    • by 
    •   19  
      Web MiningSemantic Web technology - OntologiesWeb architecture and Web miningWeb Usage Mining
    • by 
    •   19  
      Web MiningSemantic Web technology - OntologiesWeb architecture and Web miningWeb Usage Mining
This paper introduces the GVIS framework and describes one of its applications built in support of user profile awareness. This application is aimed at opening part of users' profiles to their inspection by exploiting a graphical... more
    • by  and +1
    •   18  
      Human Computer InteractionUser ModelingInformation VisualizationPackaging
This paper introduces the GVIS framework and describes one of its applications built in support of user profile awareness. This application is aimed at opening part of users' profiles to their inspection by exploiting a graphical... more
    • by 
    •   18  
      Human Computer InteractionUser ModelingInformation VisualizationPackaging