Journal articles on the topic 'URLs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'URLs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wani, Vipin, Aniket Paul, and Kaushik Kumar. "Optimised URL Shortener using Cloud Platform." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 95–101. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.010.
Full textLee, Ong Vienna, Ahmad Heryanto, Mohd Faizal Ab Razak, Anis Farihan Mat Raffei, Danakorn Nincarean Eh Phon, Shahreen Kasim, and Tole Sutikno. "A malicious URLs detection system using optimization and machine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1210. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1210-1214.
Full textGoel, Kavita, Jay Shankar Prasad, and Saba Hilal. "Removing Duplicate URLs based on URL Normalization and Query Parameter." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 361. http://dx.doi.org/10.14419/ijet.v7i3.12.16107.
Full textRajesh, M., R. Abhilash, and R. Praveen Kumar. "URL ATTACKS: Classification of URLs via Analysis and Learning." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 980. http://dx.doi.org/10.11591/ijece.v6i3.7208.
Full textRajesh, M., R. Abhilash, and R. Praveen Kumar. "URL ATTACKS: Classification of URLs via Analysis and Learning." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 980. http://dx.doi.org/10.11591/ijece.v6i3.pp980-985.
Full textKhan, Firoz, Jinesh Ahamed, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "Detecting malicious URLs using binary classification through adaboost algorithm." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 997. http://dx.doi.org/10.11591/ijece.v10i1.pp997-1005.
Full textChen, Zuguo, Yanglong Liu, Chaoyang Chen, Ming Lu, and Xuzhuo Zhang. "Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model." Security and Communication Networks 2021 (May 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/9994127.
Full textHabibzadeh, P. "Decay of References to Web sites in Articles Published in General Medical Journals: Mainstream vs Small Journals." Applied Clinical Informatics 04, no. 04 (2013): 455–64. http://dx.doi.org/10.4338/aci-2013-07-ra-0055.
Full textSife, Alfred Said, and Edda Tandi Lwoga. "Retrieving vanished Web references in health science journals in East Africa." Information and Learning Science 118, no. 7/8 (July 10, 2017): 385–92. http://dx.doi.org/10.1108/ils-04-2017-0030.
Full textNiveditha, B., and Mallinath Kumbar. "A Study of Availability and Recovery of URLs in Library and Information Science Scholarly Journals." Asian Journal of Information Science and Technology 10, no. 1 (May 5, 2020): 51–61. http://dx.doi.org/10.51983/ajist-2020.10.1.297.
Full textAljebreen, Abdullah, Weiyi Meng, and Eduard Dragut. "Segmentation of Tweets with URLs and its Applications to Sentiment Analysis." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 14 (May 18, 2021): 12480–88. http://dx.doi.org/10.1609/aaai.v35i14.17480.
Full textVyawhare, Chaitanya R., Reshma Y. Totare, Prashant S. Sonawane, and Purva B. Deshmukh. "Machine Learning System for Malicious Website Detection: A Literature Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 56–61. http://dx.doi.org/10.22214/ijraset.2022.42050.
Full textPunj, Deepika, and Ashutosh Dixit. "Design of a Migrating Crawler Based on a Novel URL Scheduling Mechanism using AHP." International Journal of Rough Sets and Data Analysis 4, no. 1 (January 2017): 95–110. http://dx.doi.org/10.4018/ijrsda.2017010106.
Full textAmbilwade, Miss Priyanka Vasant. "Detecting Malicious URLs using R-CNN and Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1443–49. http://dx.doi.org/10.22214/ijraset.2021.35284.
Full textPeng, Yongfang, Shengwei Tian, Long Yu, Yalong Lv, and Ruijin Wang. "A Joint Approach to Detect Malicious URL Based on Attention Mechanism." International Journal of Computational Intelligence and Applications 18, no. 03 (September 2019): 1950021. http://dx.doi.org/10.1142/s1469026819500214.
Full textAljabri, Malak, Fahd Alhaidari, Rami Mustafa A. Mohammad, Samiha Mirza, Dina H. Alhamed, Hanan S. Altamimi, and Sara Mhd Bachar Chrouf. "An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models." Computational Intelligence and Neuroscience 2022 (August 25, 2022): 1–14. http://dx.doi.org/10.1155/2022/3241216.
Full textGermain, Carol Anne. "URLs: Uniform Resource Locators or Unreliable Resource Locators." College & Research Libraries 61, no. 4 (July 1, 2000): 359–65. http://dx.doi.org/10.5860/crl.61.4.359.
Full textWu, Tiefeng, Miao Wang, Yunfang Xi, and Zhichao Zhao. "Malicious URL Detection Model Based on Bidirectional Gated Recurrent Unit and Attention Mechanism." Applied Sciences 12, no. 23 (December 2, 2022): 12367. http://dx.doi.org/10.3390/app122312367.
Full textKumi, Sandra, ChaeHo Lim, and Sang-Gon Lee. "Malicious URL Detection Based on Associative Classification." Entropy 23, no. 2 (January 31, 2021): 182. http://dx.doi.org/10.3390/e23020182.
Full textSuresh Babu, B., Thota Ravisankar, and Sriharsha A. "A URL Shortening Service by Using Flask Framework Based on Base-62 Algorithm." YMER Digital 21, no. 02 (February 15, 2022): 373–82. http://dx.doi.org/10.37896/ymer21.02/37.
Full textFederer, Lisa M. "Long-term availability of data associated with articles in PLOS ONE." PLOS ONE 17, no. 8 (August 24, 2022): e0272845. http://dx.doi.org/10.1371/journal.pone.0272845.
Full textWang, Yichen. "Malicious URL Detection An Evaluation of Feature Extraction and Machine Learning Algorithm." Highlights in Science, Engineering and Technology 23 (December 3, 2022): 117–23. http://dx.doi.org/10.54097/hset.v23i.3209.
Full textM I, Shilpa. "Malicious Websites Classification Using Machine Learning Techniques: A Survey Paper." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3875–79. http://dx.doi.org/10.22214/ijraset.2022.45824.
Full textLam, Nguyen Tung. "Developing a Framework for Detecting Phishing URLs using Machine Learning." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (November 13, 2021): 61–67. http://dx.doi.org/10.46338/ijetae1121_08.
Full textMishra, Anshumaan, and Fancy. "Efficient Detection of Phising Hyperlinks using Machine Learning." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 23–33. http://dx.doi.org/10.5121/ijci.2021.100204.
Full textElsadig, Muna, Ashraf Osman Ibrahim, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, and Wamda Nagmeldin. "Intelligent Deep Machine Learning Cyber Phishing URL Detection Based on BERT Features Extraction." Electronics 11, no. 22 (November 8, 2022): 3647. http://dx.doi.org/10.3390/electronics11223647.
Full textYamaguchi, Yuto, Toshiyuki Amagasa, and Hiroyuki Kitagawa. "Recommending Fresh URLs Using Twitter Lists." Proceedings of the International AAAI Conference on Web and Social Media 7, no. 1 (August 3, 2021): 733–36. http://dx.doi.org/10.1609/icwsm.v7i1.14449.
Full textNiveditha, B., and Mallinath Kumbar. "Recovery of Web Citations using Time Travel in Journal of Informetrics." Indian Journal of Information Sources and Services 11, no. 1 (May 19, 2021): 16–21. http://dx.doi.org/10.51983/ijiss-2021.11.1.2809.
Full textPohane, Miss Mayuri, and Dr A. A. Bardekar. "Review Paper on Detection of Malicious URLs Using Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 2313–14. http://dx.doi.org/10.22214/ijraset.2022.41065.
Full textEdward Phillips, Mark, Daniel Gelaw Alemneh, and Brenda Reyes Ayala. "Analysis of URL references in ETDs: a case study at the University of North Texas." Library Management 35, no. 4/5 (June 3, 2014): 293–307. http://dx.doi.org/10.1108/lm-08-2013-0073.
Full textWhitman, Michael E., and Humayun Zafar. "URL Manipulation and the Slippery Slope." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 2 (April 2013): 43–50. http://dx.doi.org/10.4018/jitn.2013040104.
Full textGrossman, Wendy M. "URLs in Urdu?" Scientific American 286, no. 6 (June 2002): 21–25. http://dx.doi.org/10.1038/scientificamerican0602-21.
Full textPrithviraj, K. R., and B. T. Sampath Kumar. "Corrosion of URLs." IFLA Journal 40, no. 1 (March 2014): 35–47. http://dx.doi.org/10.1177/0340035214526529.
Full textAzeez, N. A., and A. A. Ajayi. "Performance Evaluation of Machine Learning Techniques for Identifying Forged and Phony Uniform Resource Locators (URLs)." Nigerian Journal of Technological Development 16, no. 4 (November 22, 2019): 155–69. http://dx.doi.org/10.4314/njtd.v16i4.2.
Full textMonneret, Denis, Martin Gellerstedt, and Dominique Bonnefont-Rousselot. "Determination of age- and sex-specific 99th percentiles for high-sensitive troponin T from patients: an analytical imprecision- and partitioning-based approach." Clinical Chemistry and Laboratory Medicine (CCLM) 56, no. 5 (April 25, 2018): 685–96. http://dx.doi.org/10.1515/cclm-2017-0256.
Full textDe Villiers, John E., and André P. Calitz. "A Supplementary Tool for Web-archiving Using Blockchain Technology." African Journal of Information and Communication, no. 25 (June 30, 2020): 1–14. http://dx.doi.org/10.23962/10539/29194.
Full textLai, Chun-Ming, Hung-Jr Shiu, and Jon Chapman. "Quantifiable Interactivity of Malicious URLs and the Social Media Ecosystem." Electronics 9, no. 12 (November 30, 2020): 2020. http://dx.doi.org/10.3390/electronics9122020.
Full textBrown, Christopher C. "Knowing Where They Went: Six Years of Online Access Statistics via the Online Catalog for Federal Government Information." College & Research Libraries 72, no. 1 (January 1, 2011): 43–61. http://dx.doi.org/10.5860/crl-68r1.
Full textAbiodun, Orunsolu, Sodiya A.S, and Kareem S.O. "LINKCALCULATOR – AN EFFICIENT LINK-BASED PHISHING DETECTION TOOL." Acta Informatica Malaysia 4, no. 2 (October 2, 2020): 37–44. http://dx.doi.org/10.26480/aim.02.2020.37.44.
Full textBu, Seok-Jun, and Hae-Jung Kim. "Optimized URL Feature Selection Based on Genetic-Algorithm-Embedded Deep Learning for Phishing Website Detection." Electronics 11, no. 7 (March 30, 2022): 1090. http://dx.doi.org/10.3390/electronics11071090.
Full textFord, Charlotte E., and Stephen P. Harter. "The Downside of Scholarly Electronic Publishing: Problems in Accessing Electronic Journals through Online Directories and Catalogs." College & Research Libraries 59, no. 4 (July 1, 1998): 335–46. http://dx.doi.org/10.5860/crl.59.4.335.
Full textWu, Tiefeng, Yunfang Xi, Miao Wang, and Zhichao Zhao. "Classification of Malicious URLs by CNN Model Based on Genetic Algorithm." Applied Sciences 12, no. 23 (November 24, 2022): 12030. http://dx.doi.org/10.3390/app122312030.
Full textHaigh, Susan. "Comparing the Use of Books with Enhanced Records versus Those Without Enhancements: Methodology Leads to Questionable Conclusions." Evidence Based Library and Information Practice 2, no. 2 (June 6, 2007): 110. http://dx.doi.org/10.18438/b82g6g.
Full textZittrain, Jonathan, Kendra Albert, and Lawrence Lessig. "Perma: Scoping and Addressing the Problem of Link and Reference Rot in Legal Citations." Legal Information Management 14, no. 2 (June 2014): 88–99. http://dx.doi.org/10.1017/s1472669614000255.
Full textPatel, Rutul, Sanjay Kshetry, Sanket Berad, and Justin Zirthantlunga. "Phishing URL Detection using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 3467–72. http://dx.doi.org/10.22214/ijraset.2022.39979.
Full textWu, Shaomei, Chenhao Tan, Jon Kleinberg, and Michael Macy. "Does Bad News Go Away Faster?" Proceedings of the International AAAI Conference on Web and Social Media 5, no. 1 (August 3, 2021): 646–49. http://dx.doi.org/10.1609/icwsm.v5i1.14196.
Full textVyawhare, Chaitanya R., Reshma Y. Totare, Prashant S. Sonawane, and Purva B. Deshmukh. "Machine Learning System for Malicious Website Detection using Concept Drift Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 47–55. http://dx.doi.org/10.22214/ijraset.2022.42048.
Full textPandian, Asha, Sumit Kumar, and Satish Kumar. "URL Sand Virus." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3553–57. http://dx.doi.org/10.1166/jctn.2020.9230.
Full textLoan, Fayaz Ahmad, and Ufaira Yaseen Shah. "The decay and persistence of web references." Digital Library Perspectives 36, no. 2 (May 9, 2020): 157–66. http://dx.doi.org/10.1108/dlp-02-2020-0013.
Full textKumar, Harish, Anshal Prasad, Ninad Rane, Nilay Tamane, and Anjali Yeole. "Dr. Phish: Phishing Website Detector." E3S Web of Conferences 297 (2021): 01032. http://dx.doi.org/10.1051/e3sconf/202129701032.
Full text