Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Malicious-Url-Detection'
Malicious-Url-Detection published presentations and documents on DocSlides.
MALICIOUS URL DETECTION
by conchita-marotz
MALICIOUS URL DETECTION For Machine Learning Cour...
Detecting and Characterizing Social Spam Campaigns Hongyu Gao
by aaron
Detecting and Characterizing Social Spam Campaign...
International Journal of
by brooke
Arpitha G et al , Computer Science and Mobile Com...
Scalable Real Time Prediction Algorithm for Drive by Download Attack on Twitter
by celsa-spraggs
By . Amir Javed. Supervisor : Dr. Pete Burnap. ...
RiskRanker : Scalable and Accurate Zero-day Android Malware Detection
by relylancome
Grace. M, Zhou. Y, . Shilong. . Z, Jiang. . X. Ris...
Category X Other Malicious Harassment
by jacey
ealize What I Was Saying of me teasing me about ...
Malicious Hubs
by phoebe-click
Sarah . Jaffer. PCs monitored by users. Varying l...
Malicious Code and Application Attacks
by aaron
Unit - . 2. Outline. Malicious code. Password att...
Malicious Code
by sherrill-nordquist
CSH6 Chapter 16. “Malicious Code”. Robert Gue...
Malicious Attacks
by jane-oiler
Nicole Hamilton, Dennis . Meng. , Alex . Shie. , ...
Analyzing and Detecting Malicious Flash Advertisements
by min-jolicoeur
Sean Ford, Macro . Cova. , . Christopher . Kruege...
A Game-Theoretic Model for Defending Against Malicious User
by giovanna-bartolotta
Bahman . Rashidi. December 5. th. , 2014. 1. Over...
International Journal of Advanced Trends in Engineering and Technology
by isabella
Impact Factor: 5.665, ISSN (Online): 2456 - 4664 ...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
Spam Campaign Cluster Detection Using Redirected URLs and R
by debby-jeon
Authors. Abu Awal Md Shoeb, Dibya Mukhopadhyay, S...
WARNINGBIRD: A Near Real-time Detection System for Suspicio
by pamella-moone
Abstract. Twitter is prone to malicious tweets co...
Knowing Your Enemy
by sherrill-nordquist
Understanding and Detecting. Malicious Web Advert...
Malevolution
by mitsue-stanley
: . The Evolution of Evasive Malware . Giovanni V...
Web Security Defense Against The Dark Arts
by conchita-marotz
Cedric Cochin 1 TBD. Intel Security - McAfee La...
Detecting and Characterizing Social Spam Campaigns
by yoshiko-marsland
Hongyu . Gao. , . Jun Hu. , . Christo . Wilson. ,...
Trends in Circumventing Web-Malware Detection
by giovanna-bartolotta
UTSA. Moheeb Abu Rajab, Lucas Ballard, Nav Jagpal...
Web-Based Malware
by lindy-dunigan
Jason . Ganzhorn. 5-12-2010. 1. Background. A lar...
From DNA to Beer URL for From DNA to Beer
by SimplySweet
Pictures of Nursing. URL. for Pictures of Nursing...
On URL Changes and Handovers in Social Media
by rouperli
Hossein . Hamooni. Nikan. . Chavoshi. Abdullah . ...
Browsing the Internet What is a URL?
by jane-oiler
What is a URL?. URL stands for – Uniform Resour...
Scalable URL Matching with Small Memory Footprint
by tawny-fly
David Hay . With . Anat Bremler-Barr, Daniel . Kr...
On URL Changes and Handovers in Social Media
by cheryl-pisano
Hossein . Hamooni. Nikan. . Chavoshi. Abdullah ....
Design and Evaluation of a Real-Time URL Spam
by celsa-spraggs
Filtering. Service. Kurt Thomas. , Chris Grier, ...
Anatomy of a URL:
by alexa-scheidler
Finding Broken Links. Dr. Steve Broskoske. Miseri...
Output URL Bidding
by lindy-dunigan
Panagiotis Papadimitriou. , Hector Garcia-Molina,...
A Practical Approach to Manage Phishing Incident with URL F
by natalia-silvester
Kasom. . Koth-Arsa. , . Surachai. . Chitpinityo...
SAS Deep Learning Object Detection, Keypoint Detection
by udeline
Xindian. Long. 2018.09. Outline. Introduction. Ob...
ICP Detection Limits Detection Limit (DL) or
by paige
Limit of Detection (LOD). The detection limit is t...
Face Detection CSE 576 Face detection
by molly
State-of-the-art face detection demo. (Courtesy . ...
Pool Leak Detection Albuquerque
by Albuquerque
ABQ Leak Locator brings years of systems engineeri...
Leak Detection Albuquerque Nm
by Albuquerque
we have evolved the process and methodology of le...
Gradiometers for UXO Gradiometers for UXO Detection Detection Alan Cameron GSE Rentals Traditional Detection Traditional Detection Methods Methods Pulse Induced Metal Detector Towed Magnetometer Pu
by olivia-moreira
02nT Faster cycle rates Up to 10Hz Longer range de...
Automate, or Die
by giovanna-bartolotta
Building . a Continuous Response Architecture. Co...
Automatic KY guardrail detection by machine learning
by paisley
KYTC / KTC / VIS . KYTC Photo logging van. The Ken...
Towards Online Spam Filtering in Social Networks
by conchita-marotz
Hongyu. . Gao. , . Yan . Chen, Kathy Lee, Diana ...
Load More...