Academic literature on the topic 'URLs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'URLs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "URLs"
Wani, Vipin, Aniket Paul, and Kaushik Kumar. "Optimised URL Shortener using Cloud Platform." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 95–101. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.010.
Full textLee, Ong Vienna, Ahmad Heryanto, Mohd Faizal Ab Razak, Anis Farihan Mat Raffei, Danakorn Nincarean Eh Phon, Shahreen Kasim, and Tole Sutikno. "A malicious URLs detection system using optimization and machine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1210. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1210-1214.
Full textGoel, Kavita, Jay Shankar Prasad, and Saba Hilal. "Removing Duplicate URLs based on URL Normalization and Query Parameter." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 361. http://dx.doi.org/10.14419/ijet.v7i3.12.16107.
Full textRajesh, M., R. Abhilash, and R. Praveen Kumar. "URL ATTACKS: Classification of URLs via Analysis and Learning." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 980. http://dx.doi.org/10.11591/ijece.v6i3.7208.
Full textRajesh, M., R. Abhilash, and R. Praveen Kumar. "URL ATTACKS: Classification of URLs via Analysis and Learning." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 980. http://dx.doi.org/10.11591/ijece.v6i3.pp980-985.
Full textKhan, Firoz, Jinesh Ahamed, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "Detecting malicious URLs using binary classification through adaboost algorithm." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 997. http://dx.doi.org/10.11591/ijece.v10i1.pp997-1005.
Full textChen, Zuguo, Yanglong Liu, Chaoyang Chen, Ming Lu, and Xuzhuo Zhang. "Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model." Security and Communication Networks 2021 (May 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/9994127.
Full textHabibzadeh, P. "Decay of References to Web sites in Articles Published in General Medical Journals: Mainstream vs Small Journals." Applied Clinical Informatics 04, no. 04 (2013): 455–64. http://dx.doi.org/10.4338/aci-2013-07-ra-0055.
Full textSife, Alfred Said, and Edda Tandi Lwoga. "Retrieving vanished Web references in health science journals in East Africa." Information and Learning Science 118, no. 7/8 (July 10, 2017): 385–92. http://dx.doi.org/10.1108/ils-04-2017-0030.
Full textNiveditha, B., and Mallinath Kumbar. "A Study of Availability and Recovery of URLs in Library and Information Science Scholarly Journals." Asian Journal of Information Science and Technology 10, no. 1 (May 5, 2020): 51–61. http://dx.doi.org/10.51983/ajist-2020.10.1.297.
Full textDissertations / Theses on the topic "URLs"
Ortega, San Martin Luis. "Recommended URLs." Revista de Química, 2012. http://repositorio.pucp.edu.pe/index/handle/123456789/99737.
Full textAquí encontrará un grupo de páginas web que podrían ser de su interés. La primera es de utilidad en el área de materiales, ya sea en docencia o investigación. La segunda consiste en un blog de divulgación científica que seguro le descubrirá un lado de la química que desconoce. Finalmente, se muestra una página web que contiene vídeos que podríanserle útiles en el salón de su clase.
Zapata, Ramirez Victor. "Recommended URLs." Revista de Química, 2013. http://repositorio.pucp.edu.pe/index/handle/123456789/99893.
Full text- Periodic Table of Videos (http://www.periodicvideos.com)- MIT Open Courseware (http://www.ocw.mit.edu)- Cambridge Chemistry Challenge (www.c3l6.org)
Ma, Justin Tung. "Learning to detect malicious URLs." Diss., [La Jolla] : University of California, San Diego, 2010. http://wwwlib.umi.com/cr/ucsd/fullcit?p3404292.
Full textTitle from first page of PDF file (viewed June 10, 2010). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (leaves 119-124).
Cheng, Aidan. "Using Machine Learning to Detect Malicious URLs." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1567.
Full textSilva, Eduina Da. "The influence of URLs on customer perception and reaction." Thesis, University of Macau, 2005. http://umaclib3.umac.mo/record=b1636667.
Full textBezerra, Maria Azevedo. "Uma investigação do uso de características na tetecção de URLs." Universidade Federal do Amazonas, 2015. http://tede.ufam.edu.br/handle/tede/4740.
Full textApproved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-12-03T19:17:32Z (GMT) No. of bitstreams: 1 Dissertação - Maria Azevedo Bezerra.pdf: 3338616 bytes, checksum: fc58f97452c2e63faf03817434866ec3 (MD5)
Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-12-03T19:24:08Z (GMT) No. of bitstreams: 1 Dissertação - Maria Azevedo Bezerra.pdf: 3338616 bytes, checksum: fc58f97452c2e63faf03817434866ec3 (MD5)
Made available in DSpace on 2015-12-03T19:24:08Z (GMT). No. of bitstreams: 1 Dissertação - Maria Azevedo Bezerra.pdf: 3338616 bytes, checksum: fc58f97452c2e63faf03817434866ec3 (MD5) Previous issue date: 2015-09-11
Não Informada
Malicious URLs have become a channel for criminal activities on the Internet, such as spam and phishing. Current solutions for validation and verification of malicious URLs are considered or are believed to be accurate, with well-adjusted results. However, is it really possible or feasible to obtain 100% of accuracy in these solutions? This work describes a simple and direct investigation of features, bases and URL formats, aiming to show that the results of validation and verification URLs are highly dependent on certain aspects/factors. The idea is to extract URL features (lexical, DNS and others) for obtain the maximum information from the URLs and employ machine learning algorithms to question their influence throughout the process. In order to prove this idea, were created four hypotheses that showed that it is possible to disagree with the results of several studies from the literature.
URLs maliciosas tornaram-se um canal para atividades criminosas na Internet, como spam e phishing. As atuais soluções para validação e verificação de URLs maliciosas se consideram ou são consideradas precisas, com resultados bem ajustados. Contudo, será que realmente é possível ou factível se obter percentuais beirando 100% de precisão nessas soluções? Neste sentido, esta dissertação descreve uma simples e direta investigação de características, bases e formatos de URLs, visando mostrar que os resultados de validação e verificação de URLs são bastante dependentes de certos aspectos/fatores. A ideia é extrair características (léxicas, DNS e outras) que permitam obter o máximo de informação das URLs e empregar algoritmos de aprendizagem de máquina para questionar a influência dessas características em todo o processo. Como forma de provar essa ideia, foram elaboramos quatro hipóteses, que ao final no trabalho, mostraram que é possível discordar do resultado de vários trabalhos já existentes na literatura.
Egan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.
Full textHenrique, Wallace Favoreto. "Verificação de unicidade de URLs em coletores de páginas Web." Universidade Federal de Minas Gerais, 2011. http://hdl.handle.net/1843/SLSS-8GQJNA.
Full textUma das principais dificuldades existentes no desenvolvimento de um coletor de páginas web está no componente verificador de unicidade de URLs, pois estruturas de dados complexas são exigidas para garantir que a identificação das URLs ainda não coletadas seja feita de forma eficaz e eficiente. Caso o verificador de unicidade de URLs não ofereça eficácia e eficiência, os outros componentes do coletor serão prejudicados. Neste trabalho, apresentamos um novo algoritmo para verificar unicidade de URLs chamado VEUNI (VErificador de UNIcidade de URLs).O algoritmo VEUNI foi comparado com o melhor algoritmo conhecido na literatura, o qual foi considerado um baseline nos experimentos. O estudo comparativo entre o algoritmo VEUNI e o algoritmo baseline foi realizado por meio de uma simulação de uma coleta de aproximadamente 350 milhões de páginas, utilizando uma coleção de referência chamada ClueWeb09. Os resultados experimentais mostram que o algoritmo proposto é uma alternativa que pode ser utilizada com êxito em coletores de páginas que visam ser escaláveis para toda a Web.
Li, Sirui. "A Study of Corrosion Monitoring Techniques Used in URLs for Metals." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6624.
Full textAl-Janabi, Mohammed Fadhil Zamil. "Detection of suspicious URLs in online social networks using supervised machine learning algorithms." Thesis, Keele University, 2018. http://eprints.keele.ac.uk/5581/.
Full textBooks on the topic "URLs"
Ackermann, Ernest C. Learning to use the Internet and World Wide Web with revitalized URLs. Wilsonville, OR: Franklin, Beedle & Associates, 2004.
Find full textBest practices in policies and procedures: Includes table of contents examples and policy/procedure URLs. Westerville, Ohio: Process Improvement Publishing, 2001.
Find full textNikić, Momir. Urla. Beograd: Geopoetika, 2000.
Find full textḤijāzī, Aḥmad ʻAbd al-Muʻṭī. Urās. [Cairo]: Akhbār al-Yawm, 1989.
Find full textMićović, Milovan. Bademi, urbs. Novi Sad: Prometej, 1998.
Find full textURSS-Russia. Milano: Rizzoli, 1985.
Find full textJovanović, Miodrag. Uros Predic. Novi Sad: Matiza srpska, 1998.
Find full textJosé Carlos de Figueiredo Ferraz. Urbs nostra. São Paulo, SP, Brasil: Edusp, 1991.
Find full textUrbs: Roman. Paris]: Le Tripode, 2013.
Find full textMoretti, Massimo. L' urlo. Venezia: Marsilio, 1993.
Find full textBook chapters on the topic "URLs"
Kern, Thorsten A. "URLs." In Engineering Haptic Devices, 437–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-88248-0_15.
Full textRocher, Graeme, and Jeff Brown. "Mapping URLs." In The Definitive Guide to Grails, 143–58. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-0871-6_6.
Full textBrown, Jeff Scott, and Graeme Rocher. "Mapping URLs." In The Definitive Guide to Grails 2, 139–53. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4378-6_6.
Full textAlchin, Marty. "URLs and Views." In Pro Django, 83–106. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5810-0_4.
Full textPusch, Roland. "Underground Laboratories (URLs)." In Geological Storage of Highly Radioactive Waste, 275–319. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-77333-7_6.
Full textGood, Nathan A. "URLs and Paths." In Regular Expression Recipes for Windows Developers, 91–125. Berkeley, CA: Apress, 2005. http://dx.doi.org/10.1007/978-1-4302-0028-4_2.
Full textSanderson, Steven. "URLs and Routing." In Pro ASP.NET MVC 2 Framework, 235–81. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2887-5_8.
Full textWatson, Brent. "Mapping URLs to Methods." In Stripes by Example, 23–27. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0980-6_4.
Full textFreeman, Adam, and Steven Sanderson. "URLs, Routing, and Areas." In Pro ASP.NET MVC 3 Framework, 325–83. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3405-0_11.
Full textRubio, Daniel. "Django Urls and Views." In Beginning Django, 31–72. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2787-9_2.
Full textConference papers on the topic "URLs"
Soon, Lay-Ki, and Sang Ho Lee. "Identifying Equivalent URLs Using URL Signatures." In 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems (SITIS). IEEE, 2008. http://dx.doi.org/10.1109/sitis.2008.21.
Full textKannan, Natarajan, and Toufeeq Hussain. "Live URLs." In the 15th international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1135777.1135924.
Full textHan, Xiaogang, Wenjun Zhou, Xing Jiang, Hengjie Song, Ming Zhong, and Toyoaki Nishida. "Utilizing URLs Position to Estimate Intrinsic Query-URL Relevance." In 2013 IEEE International Conference on Data Mining (ICDM). IEEE, 2013. http://dx.doi.org/10.1109/icdm.2013.20.
Full textHinne, Max, Wessel Kraaij, Stephan Raaijmakers, Suzan Verberne, Theo van der Weide, and Maarten van der Heijden. "Annotation of URLs." In the 32nd international ACM SIGIR conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1571941.1572051.
Full textMa, Justin, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. "Identifying suspicious URLs." In the 26th Annual International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1553374.1553462.
Full textGonçalves, Diego Luiz Nunes, and Dionsio Machado Leite Filho. "URLYZER: sistema de identificação de URLs maliciosas utilizando IA como suporte à tomada de decisão." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbrc_estendido.2021.17180.
Full textSendi, Razan. "The Classification and Detection of Malicious URLs Using a Machine Learning Based Approach." In International Petroleum Technology Conference. IPTC, 2022. http://dx.doi.org/10.2523/iptc-22661-ms.
Full textPham, Tuan Dung, Thi Thanh Thuy Pham, Sy Tuong Hoang, and Viet Cuong Ta. "Exploring Efficiency of GAN-based Generated URLs for Phishing URL Detection." In 2021 International Conference on Multimedia Analysis and Pattern Recognition (MAPR). IEEE, 2021. http://dx.doi.org/10.1109/mapr53640.2021.9585287.
Full textAldwairi, Monther, and Rami Alsalman. "MALURLs: Malicious URLs Classification System." In Annual International Conference on Information Technology and Applications & Annual International Conference on Control, Automation and Robotics. Global Science and Technology Forum, 2011. http://dx.doi.org/10.5176/978-981-08-8113-9_ita29.
Full textBai, Xiao, B. Barla Cambazoglu, and Flavio P. Junqueira. "Discovering URLs through user feedback." In the 20th ACM international conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2063576.2063592.
Full textReports on the topic "URLs"
Vaha-Sipila, A. URLs for Telephone Calls. RFC Editor, April 2000. http://dx.doi.org/10.17487/rfc2806.
Full textMealling, M., and R. Denenberg, eds. Report from the Joint W3C/IETF URI Planning Interest Group: Uniform Resource Identifiers (URIs), URLs, and Uniform Resource Names (URNs): Clarifications and Recommendations. RFC Editor, August 2002. http://dx.doi.org/10.17487/rfc3305.
Full textRichardson, M., J. Latour, and H. Habibi Gharakheili. Loading Manufacturer Usage Description (MUD) URLs from QR Codes. RFC Editor, May 2022. http://dx.doi.org/10.17487/rfc9238.
Full textMacDonald, Stuart, Connor Rees, and Joost S. Remove, Impede, Disrupt, Redirect: Understanding & Combating Pro-Islamic State Use of File-Sharing Platforms. RESOLVE Network, April 2022. http://dx.doi.org/10.37805/ogrr2022.1.
Full textNeufeld, G., and J. Baer. The Use of URLs as Meta-Syntax for Core Mail List Commands and their Transport through Message Header Fields. RFC Editor, July 1998. http://dx.doi.org/10.17487/rfc2369.
Full textMacdonald, Stuart, Kamil Yilmaz, Chamin Herath, J. M. Berger, Suraj Lakhani, Lella Nouri, and Maura Conway. The European Far-Right Online: An Exploratory Twitter Outlink Analysis of German & French Far-Right Online Ecosystems. RESOLVE Network, May 2022. http://dx.doi.org/10.37805/remve2022.2.
Full textDaigle, L., P. Deutsch, B. Heelan, C. Alpaugh, and M. Maclachlan. Uniform Resource Agents (URAs). RFC Editor, October 1996. http://dx.doi.org/10.17487/rfc2016.
Full textSaint-Andre, P., and J. Klensin. Uniform Resource Names (URNs). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8141.
Full textMavrakis, D., H. Layec, and K. Kartmann. VEMMI URL Specification. RFC Editor, March 1997. http://dx.doi.org/10.17487/rfc2122.
Full textNewman, C. IMAP URL Scheme. RFC Editor, September 1997. http://dx.doi.org/10.17487/rfc2192.
Full text