Journal articles on the topic 'Defacement Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 journal articles for your research on the topic 'Defacement Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hoang, Xuan Dau, and Ngoc Tuong Nguyen. "Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures." Computers 8, no. 2 (May 8, 2019): 35. http://dx.doi.org/10.3390/computers8020035.
Full textBergadano, Francesco, Fabio Carretto, Fabio Cogno, and Dario Ragno. "Defacement Detection with Passive Adversaries." Algorithms 12, no. 8 (July 29, 2019): 150. http://dx.doi.org/10.3390/a12080150.
Full textAlbalawi, Mariam, Rasha Aloufi, Norah Alamrani, Neaimh Albalawi, Amer Aljaedi, and Adel R. Alharbi. "Website Defacement Detection and Monitoring Methods: A Review." Electronics 11, no. 21 (November 1, 2022): 3573. http://dx.doi.org/10.3390/electronics11213573.
Full textMondragón, Oscar, Andrés Felipe Mera Arcos, Christian Urcuqui, and Andrés Navarro Cadavid. "Security control for website defacement." Sistemas y Telemática 15, no. 41 (August 1, 2017): 45–55. http://dx.doi.org/10.18046/syt.v15i41.2442.
Full textCho, Youngho. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms." Electronics 8, no. 11 (November 13, 2019): 1338. http://dx.doi.org/10.3390/electronics8111338.
Full textDavanzo, G., E. Medvet, and A. Bartoli. "Anomaly detection techniques for a web defacement monitoring service." Expert Systems with Applications 38, no. 10 (September 2011): 12521–30. http://dx.doi.org/10.1016/j.eswa.2011.04.038.
Full textKung, Ren-Yi, Nai-Hsin Pan, Charles C. N. Wang, and Pin-Chan Lee. "Application of Deep Learning and Unmanned Aerial Vehicle on Building Maintenance." Advances in Civil Engineering 2021 (April 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/5598690.
Full textR, Newlin Shebiah, and Arivazhagan S. "Versatile Defacement Detection by Monitoring Video Sequences Using Deep Learning." European Journal of Engineering Research and Science 4, no. 7 (July 19, 2019): 37–41. http://dx.doi.org/10.24018/ejers.2019.4.7.1396.
Full textR, Newlin Shebiah, and Arivazhagan S. "Versatile Defacement Detection by Monitoring Video Sequences Using Deep Learning." European Journal of Engineering and Technology Research 4, no. 7 (July 19, 2019): 37–41. http://dx.doi.org/10.24018/ejeng.2019.4.7.1396.
Full textGhaleb, Fuad A., Mohammed Alsaedi, Faisal Saeed, Jawad Ahmad, and Mohammed Alasli. "Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning." Sensors 22, no. 9 (April 28, 2022): 3373. http://dx.doi.org/10.3390/s22093373.
Full textChandak, Rakhi, Manoj Chandak, Pranali Thakare, Ramhari Sathawane, Swapnil Mohod, Runal Bansod, Pranada Deshmukh, and Zareesh Akhtar. "Trending Breakthroughs in the Advances of Detection of Oral Premalignant and Malignant Lesions - A Review." Journal of Evolution of Medical and Dental Sciences 10, no. 28 (July 12, 2021): 2122–27. http://dx.doi.org/10.14260/jemds/2021/433.
Full textBartoli, Alberto, Giorgio Davanzo, and Eric Medvet. "A Framework for Large-Scale Detection of Web Site Defacements." ACM Transactions on Internet Technology 10, no. 3 (October 2010): 1–37. http://dx.doi.org/10.1145/1852096.1852098.
Full textWEI, Wenhan, and Yigui DENG. "Detection model and method of website defacements based on attributes partial changes." Journal of Computer Applications 33, no. 2 (September 24, 2013): 430–33. http://dx.doi.org/10.3724/sp.j.1087.2013.00430.
Full textKavyashree, K., C. N. Sowmyarani, and P. Dayananda. "Transmission Control Protocol Off Path Exploits in Web." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 3995–98. http://dx.doi.org/10.1166/jctn.2020.9006.
Full textShi, Wenzhong, Wael Ahmed, Na Li, Wenzheng Fan, Haodong Xiang, and Muyang Wang. "Semantic Geometric Modelling of Unstructured Indoor Point Cloud." ISPRS International Journal of Geo-Information 8, no. 1 (December 27, 2018): 9. http://dx.doi.org/10.3390/ijgi8010009.
Full textDu, Ruizhong, Yan Gao, and Cui Liu. "Fine-grained Web Service Trust Detection: A Joint Method of Machine Learning and Blockchain." Journal of Web Engineering, July 30, 2022. http://dx.doi.org/10.13052/jwe1540-9589.2157.
Full textR, Shalini, and Sasikala S. "Gaussian Kernel Prompted Fuzzy C Means Algorithm with Multi- Object Contouring Method for Segmenting NPDR Features in Diabetic Retinopathy Fundus Images." Global Journal of Science Frontier Research, December 23, 2019, 1–17. http://dx.doi.org/10.34257/gjsfrfvol19is5pg1.
Full textNguyen, Trong Hung, Xuan Dau Hoang, and Duc Dung Nguyen. "Detecting Website Defacement Attacks using Web-page Text and Image Features." International Journal of Advanced Computer Science and Applications 12, no. 7 (2021). http://dx.doi.org/10.14569/ijacsa.2021.0120725.
Full text