-
1
-
2
-
3
ReferralWeb--a resource location system guided by personal relations
Published 2008Get full text
Thesis -
4
Forecast of oil and gas resources located in wedges of South-Caspian mega depression basement
Published 2016-06-01Get full text
Article -
5
An update on Uniform Resource Locator (URL) decay in MEDLINE abstracts and measures for its mitigation
Published 2008-06-01“…<p>Abstract</p> <p>Background</p> <p>For years, Uniform Resource Locator (URL) decay or "link rot" has been a growing concern in the field of biomedical sciences. …”
Get full text
Article -
6
The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study
Published 2020-12-01Subjects: Get full text
Article -
7
Resource Location-Intelligence Model Conceptualized for Mayon Volcano Danger Zones in Albay, Philippines
Published 2018-06-01“…The researcherstried to highlight how spatial integration could enhance existing LGU information systems by considering human resource locations (x, y) as fundamental in integrating incoming numerous real-time information from emergency incidents. …”
Get full text
Article -
8
Performance Evaluation of Machine Learning Techniques for Identifying Forged and Phony Uniform Resource Locators (URLs)
Published 2019-09-01“…According to several reports which are discussed in the introductory part of this work, millions of people have become victims of fake Uniform Resource Locators (URLs) sent to their mails by spammers. …”
Get full text
Article -
9
-
10
Performance Evaluation of Machine Learning Techniques for Identifying Forged and Phony Uniform Resource Locators (URLs)
Published 2019-12-01“…According to several reports which are discussed in the introductory part of this work, millions of people have become victims of fake Uniform Resource Locators (URLs) sent to their mails by spammers. …”
Article -
11
A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators
Published 2023-04-01“…We evaluate the performance of our model on the PhishTank dataset, which is a widely used dataset for detecting phishing websites based solely on Uniform Resource Locators (URL) features. Our approach presents a unique contribution to the field of phishing detection by achieving high accuracy rates and outperforming previous state-of-the-art models. …”
Get full text
Article -
12
-
13
Characterizing temporally fragmented human activity networks in cyber space using uniform resource locator (URL) data
Published 2024-12-01“…When users access the internet, uniform resource locator (URL) data are autogenerated. Using URLs, this study presents a novel framework for exploring cyber space structure from the perspectives of complex networks and activity fragmentation. …”
Get full text
Article -
14
An enhanced deep learning‐based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders
Published 2023-05-01Subjects: Get full text
Article -
15
Phishing Detection System Through Hybrid Machine Learning Based on URL
Published 2023-01-01Subjects: Get full text
Article -
16
PhishTransformer: A Novel Approach to Detect Phishing Attacks Using URL Collection and Transformer
Published 2023-12-01Subjects: Get full text
Article -
17
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model
Published 2023-01-01Subjects: Get full text
Article -
18
Effects of COVID-19 Outbreak on Persons with Chronic Health Conditions in Anglophone West Africa: A Qualitative Study Involving Key Stakeholders
Published 2022-04-01“…The finding shows that COVID-19 caused fear, anxiety, and affected planned health delivery and resource location to interventions designed for chronic disease patients. …”
Get full text
Article -
19
Natural resource distribution and multiple forms of civil war
Published 2010“…We examine how natural resource location, rent sharing and .ghting capacities of different groups matter for ethnic conflict. …”
Working paper -
20
Cloud computing and conflicts with digital forensic investigation
Published 2013“…The distribution of cloud resource location in different countries, utilization of numerous storage devices and very limited physical access to the low-level storage devices and physical memories are just some of the reasons caused this conflict. …”
Get full text
Article