Статті в журналах з теми "URLs"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "URLs".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Wani, Vipin, Aniket Paul, and Kaushik Kumar. "Optimised URL Shortener using Cloud Platform." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 95–101. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.010.
Повний текст джерелаLee, Ong Vienna, Ahmad Heryanto, Mohd Faizal Ab Razak, Anis Farihan Mat Raffei, Danakorn Nincarean Eh Phon, Shahreen Kasim, and Tole Sutikno. "A malicious URLs detection system using optimization and machine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1210. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1210-1214.
Повний текст джерелаGoel, Kavita, Jay Shankar Prasad, and Saba Hilal. "Removing Duplicate URLs based on URL Normalization and Query Parameter." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 361. http://dx.doi.org/10.14419/ijet.v7i3.12.16107.
Повний текст джерелаRajesh, M., R. Abhilash, and R. Praveen Kumar. "URL ATTACKS: Classification of URLs via Analysis and Learning." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 980. http://dx.doi.org/10.11591/ijece.v6i3.7208.
Повний текст джерелаRajesh, M., R. Abhilash, and R. Praveen Kumar. "URL ATTACKS: Classification of URLs via Analysis and Learning." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 980. http://dx.doi.org/10.11591/ijece.v6i3.pp980-985.
Повний текст джерелаKhan, Firoz, Jinesh Ahamed, Seifedine Kadry, and Lakshmana Kumar Ramasamy. "Detecting malicious URLs using binary classification through adaboost algorithm." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 997. http://dx.doi.org/10.11591/ijece.v10i1.pp997-1005.
Повний текст джерелаChen, Zuguo, Yanglong Liu, Chaoyang Chen, Ming Lu, and Xuzhuo Zhang. "Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model." Security and Communication Networks 2021 (May 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/9994127.
Повний текст джерелаHabibzadeh, P. "Decay of References to Web sites in Articles Published in General Medical Journals: Mainstream vs Small Journals." Applied Clinical Informatics 04, no. 04 (2013): 455–64. http://dx.doi.org/10.4338/aci-2013-07-ra-0055.
Повний текст джерелаSife, Alfred Said, and Edda Tandi Lwoga. "Retrieving vanished Web references in health science journals in East Africa." Information and Learning Science 118, no. 7/8 (July 10, 2017): 385–92. http://dx.doi.org/10.1108/ils-04-2017-0030.
Повний текст джерелаNiveditha, B., and Mallinath Kumbar. "A Study of Availability and Recovery of URLs in Library and Information Science Scholarly Journals." Asian Journal of Information Science and Technology 10, no. 1 (May 5, 2020): 51–61. http://dx.doi.org/10.51983/ajist-2020.10.1.297.
Повний текст джерелаAljebreen, Abdullah, Weiyi Meng, and Eduard Dragut. "Segmentation of Tweets with URLs and its Applications to Sentiment Analysis." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 14 (May 18, 2021): 12480–88. http://dx.doi.org/10.1609/aaai.v35i14.17480.
Повний текст джерелаVyawhare, Chaitanya R., Reshma Y. Totare, Prashant S. Sonawane, and Purva B. Deshmukh. "Machine Learning System for Malicious Website Detection: A Literature Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 56–61. http://dx.doi.org/10.22214/ijraset.2022.42050.
Повний текст джерелаPunj, Deepika, and Ashutosh Dixit. "Design of a Migrating Crawler Based on a Novel URL Scheduling Mechanism using AHP." International Journal of Rough Sets and Data Analysis 4, no. 1 (January 2017): 95–110. http://dx.doi.org/10.4018/ijrsda.2017010106.
Повний текст джерелаAmbilwade, Miss Priyanka Vasant. "Detecting Malicious URLs using R-CNN and Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1443–49. http://dx.doi.org/10.22214/ijraset.2021.35284.
Повний текст джерелаPeng, Yongfang, Shengwei Tian, Long Yu, Yalong Lv, and Ruijin Wang. "A Joint Approach to Detect Malicious URL Based on Attention Mechanism." International Journal of Computational Intelligence and Applications 18, no. 03 (September 2019): 1950021. http://dx.doi.org/10.1142/s1469026819500214.
Повний текст джерелаAljabri, Malak, Fahd Alhaidari, Rami Mustafa A. Mohammad, Samiha Mirza, Dina H. Alhamed, Hanan S. Altamimi, and Sara Mhd Bachar Chrouf. "An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models." Computational Intelligence and Neuroscience 2022 (August 25, 2022): 1–14. http://dx.doi.org/10.1155/2022/3241216.
Повний текст джерелаGermain, Carol Anne. "URLs: Uniform Resource Locators or Unreliable Resource Locators." College & Research Libraries 61, no. 4 (July 1, 2000): 359–65. http://dx.doi.org/10.5860/crl.61.4.359.
Повний текст джерелаWu, Tiefeng, Miao Wang, Yunfang Xi, and Zhichao Zhao. "Malicious URL Detection Model Based on Bidirectional Gated Recurrent Unit and Attention Mechanism." Applied Sciences 12, no. 23 (December 2, 2022): 12367. http://dx.doi.org/10.3390/app122312367.
Повний текст джерелаKumi, Sandra, ChaeHo Lim, and Sang-Gon Lee. "Malicious URL Detection Based on Associative Classification." Entropy 23, no. 2 (January 31, 2021): 182. http://dx.doi.org/10.3390/e23020182.
Повний текст джерелаSuresh Babu, B., Thota Ravisankar, and Sriharsha A. "A URL Shortening Service by Using Flask Framework Based on Base-62 Algorithm." YMER Digital 21, no. 02 (February 15, 2022): 373–82. http://dx.doi.org/10.37896/ymer21.02/37.
Повний текст джерелаFederer, Lisa M. "Long-term availability of data associated with articles in PLOS ONE." PLOS ONE 17, no. 8 (August 24, 2022): e0272845. http://dx.doi.org/10.1371/journal.pone.0272845.
Повний текст джерелаWang, Yichen. "Malicious URL Detection An Evaluation of Feature Extraction and Machine Learning Algorithm." Highlights in Science, Engineering and Technology 23 (December 3, 2022): 117–23. http://dx.doi.org/10.54097/hset.v23i.3209.
Повний текст джерелаM I, Shilpa. "Malicious Websites Classification Using Machine Learning Techniques: A Survey Paper." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3875–79. http://dx.doi.org/10.22214/ijraset.2022.45824.
Повний текст джерелаLam, Nguyen Tung. "Developing a Framework for Detecting Phishing URLs using Machine Learning." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (November 13, 2021): 61–67. http://dx.doi.org/10.46338/ijetae1121_08.
Повний текст джерелаMishra, Anshumaan, and Fancy. "Efficient Detection of Phising Hyperlinks using Machine Learning." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 23–33. http://dx.doi.org/10.5121/ijci.2021.100204.
Повний текст джерелаElsadig, Muna, Ashraf Osman Ibrahim, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, and Wamda Nagmeldin. "Intelligent Deep Machine Learning Cyber Phishing URL Detection Based on BERT Features Extraction." Electronics 11, no. 22 (November 8, 2022): 3647. http://dx.doi.org/10.3390/electronics11223647.
Повний текст джерелаYamaguchi, Yuto, Toshiyuki Amagasa, and Hiroyuki Kitagawa. "Recommending Fresh URLs Using Twitter Lists." Proceedings of the International AAAI Conference on Web and Social Media 7, no. 1 (August 3, 2021): 733–36. http://dx.doi.org/10.1609/icwsm.v7i1.14449.
Повний текст джерелаNiveditha, B., and Mallinath Kumbar. "Recovery of Web Citations using Time Travel in Journal of Informetrics." Indian Journal of Information Sources and Services 11, no. 1 (May 19, 2021): 16–21. http://dx.doi.org/10.51983/ijiss-2021.11.1.2809.
Повний текст джерелаPohane, Miss Mayuri, and Dr A. A. Bardekar. "Review Paper on Detection of Malicious URLs Using Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 2313–14. http://dx.doi.org/10.22214/ijraset.2022.41065.
Повний текст джерелаEdward Phillips, Mark, Daniel Gelaw Alemneh, and Brenda Reyes Ayala. "Analysis of URL references in ETDs: a case study at the University of North Texas." Library Management 35, no. 4/5 (June 3, 2014): 293–307. http://dx.doi.org/10.1108/lm-08-2013-0073.
Повний текст джерелаWhitman, Michael E., and Humayun Zafar. "URL Manipulation and the Slippery Slope." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 2 (April 2013): 43–50. http://dx.doi.org/10.4018/jitn.2013040104.
Повний текст джерелаGrossman, Wendy M. "URLs in Urdu?" Scientific American 286, no. 6 (June 2002): 21–25. http://dx.doi.org/10.1038/scientificamerican0602-21.
Повний текст джерелаPrithviraj, K. R., and B. T. Sampath Kumar. "Corrosion of URLs." IFLA Journal 40, no. 1 (March 2014): 35–47. http://dx.doi.org/10.1177/0340035214526529.
Повний текст джерелаAzeez, N. A., and A. A. Ajayi. "Performance Evaluation of Machine Learning Techniques for Identifying Forged and Phony Uniform Resource Locators (URLs)." Nigerian Journal of Technological Development 16, no. 4 (November 22, 2019): 155–69. http://dx.doi.org/10.4314/njtd.v16i4.2.
Повний текст джерелаMonneret, Denis, Martin Gellerstedt, and Dominique Bonnefont-Rousselot. "Determination of age- and sex-specific 99th percentiles for high-sensitive troponin T from patients: an analytical imprecision- and partitioning-based approach." Clinical Chemistry and Laboratory Medicine (CCLM) 56, no. 5 (April 25, 2018): 685–96. http://dx.doi.org/10.1515/cclm-2017-0256.
Повний текст джерелаDe Villiers, John E., and André P. Calitz. "A Supplementary Tool for Web-archiving Using Blockchain Technology." African Journal of Information and Communication, no. 25 (June 30, 2020): 1–14. http://dx.doi.org/10.23962/10539/29194.
Повний текст джерелаLai, Chun-Ming, Hung-Jr Shiu, and Jon Chapman. "Quantifiable Interactivity of Malicious URLs and the Social Media Ecosystem." Electronics 9, no. 12 (November 30, 2020): 2020. http://dx.doi.org/10.3390/electronics9122020.
Повний текст джерелаBrown, Christopher C. "Knowing Where They Went: Six Years of Online Access Statistics via the Online Catalog for Federal Government Information." College & Research Libraries 72, no. 1 (January 1, 2011): 43–61. http://dx.doi.org/10.5860/crl-68r1.
Повний текст джерелаAbiodun, Orunsolu, Sodiya A.S, and Kareem S.O. "LINKCALCULATOR – AN EFFICIENT LINK-BASED PHISHING DETECTION TOOL." Acta Informatica Malaysia 4, no. 2 (October 2, 2020): 37–44. http://dx.doi.org/10.26480/aim.02.2020.37.44.
Повний текст джерелаBu, Seok-Jun, and Hae-Jung Kim. "Optimized URL Feature Selection Based on Genetic-Algorithm-Embedded Deep Learning for Phishing Website Detection." Electronics 11, no. 7 (March 30, 2022): 1090. http://dx.doi.org/10.3390/electronics11071090.
Повний текст джерелаFord, Charlotte E., and Stephen P. Harter. "The Downside of Scholarly Electronic Publishing: Problems in Accessing Electronic Journals through Online Directories and Catalogs." College & Research Libraries 59, no. 4 (July 1, 1998): 335–46. http://dx.doi.org/10.5860/crl.59.4.335.
Повний текст джерелаWu, Tiefeng, Yunfang Xi, Miao Wang, and Zhichao Zhao. "Classification of Malicious URLs by CNN Model Based on Genetic Algorithm." Applied Sciences 12, no. 23 (November 24, 2022): 12030. http://dx.doi.org/10.3390/app122312030.
Повний текст джерелаHaigh, Susan. "Comparing the Use of Books with Enhanced Records versus Those Without Enhancements: Methodology Leads to Questionable Conclusions." Evidence Based Library and Information Practice 2, no. 2 (June 6, 2007): 110. http://dx.doi.org/10.18438/b82g6g.
Повний текст джерелаZittrain, Jonathan, Kendra Albert, and Lawrence Lessig. "Perma: Scoping and Addressing the Problem of Link and Reference Rot in Legal Citations." Legal Information Management 14, no. 2 (June 2014): 88–99. http://dx.doi.org/10.1017/s1472669614000255.
Повний текст джерелаPatel, Rutul, Sanjay Kshetry, Sanket Berad, and Justin Zirthantlunga. "Phishing URL Detection using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 3467–72. http://dx.doi.org/10.22214/ijraset.2022.39979.
Повний текст джерелаWu, Shaomei, Chenhao Tan, Jon Kleinberg, and Michael Macy. "Does Bad News Go Away Faster?" Proceedings of the International AAAI Conference on Web and Social Media 5, no. 1 (August 3, 2021): 646–49. http://dx.doi.org/10.1609/icwsm.v5i1.14196.
Повний текст джерелаVyawhare, Chaitanya R., Reshma Y. Totare, Prashant S. Sonawane, and Purva B. Deshmukh. "Machine Learning System for Malicious Website Detection using Concept Drift Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 47–55. http://dx.doi.org/10.22214/ijraset.2022.42048.
Повний текст джерелаPandian, Asha, Sumit Kumar, and Satish Kumar. "URL Sand Virus." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3553–57. http://dx.doi.org/10.1166/jctn.2020.9230.
Повний текст джерелаLoan, Fayaz Ahmad, and Ufaira Yaseen Shah. "The decay and persistence of web references." Digital Library Perspectives 36, no. 2 (May 9, 2020): 157–66. http://dx.doi.org/10.1108/dlp-02-2020-0013.
Повний текст джерелаKumar, Harish, Anshal Prasad, Ninad Rane, Nilay Tamane, and Anjali Yeole. "Dr. Phish: Phishing Website Detector." E3S Web of Conferences 297 (2021): 01032. http://dx.doi.org/10.1051/e3sconf/202129701032.
Повний текст джерела