7,678 Hits in 3.7 sec

Designing efficient sampling techniques to detect webpage updates

Qingzhao Tan, Ziming Zhuang, Prasenjit Mitra, C. Lee Giles
2007 Proceedings of the 16th international conference on World Wide Web - WWW '07  
We advance the state-of-art of the samplingbased synchronization techniques by answering a challenging question: Given a sampled webpage and its change status, which other webpages are also likely to change  ...  We run extensive experiments on a large dataset of approximately 300,000 webpages to demonstrate that it is most likely to find more updated webpages in the current or upper directories of the changed  ...  In this paper, we study and improve the sampling-based update detection techniques by making the following contributions: 1) We propose a new sampling algorithm to detect webpage updates.  ... 
doi:10.1145/1242572.1242738 dblp:conf/www/TanZMG07 fatcat:3zazipb5jnd7dbirrp2lbokawm

Change Detection and Notification of Webpages: A Survey [article]

Vijini Mallawaarachchi, Lakmal Meegahapola, Roshan Alwis, Eranga Nimalarathna, Dulani Meedeniya, Sampath Jayarathna
2019 arXiv   pre-print
Majority of the currently available webpages are dynamic in nature and are changing frequently. New content gets added to webpages and existing content gets updated or deleted.  ...  Change Detection and Notification (CDN) systems were introduced to automate this monitoring process and notify users when changes occur in webpages.  ...  It includes different crawling techniques, change detection techniques, scheduling algorithms and methods to detect the frequency of webpage changes.  ... 
arXiv:1901.02660v3 fatcat:wrioarjnbvdlxki5tfl26bqqd4

A Framework for Multi Features based Phishing Information Identification using NB and SVM Approach

Jyoti S., Snehal S., Anjali P.
2018 International Journal of Computer Applications  
Criminal organizations around the world use the technique known as phishing to extract information from innocent citizens in order to access their bank details, to steal identities, to launder money and  ...  sample of a classification model training set.  ...  For bringing efficiency and correctness they have suggested some standards for web pages' design.  ... 
doi:10.5120/ijca2018918088 fatcat:ol3t4s3anbbm3mpjlk53bq5cni


Orunsolu Abiodun, Sodiya A.S, Kareem S.O
2020 Acta Informatica Malaysia  
lightweight approach to phishing detection.  ...  The proposed LinkCalculator anti-phishing scheme is based on an algorithm designed to extract link characteristics from loading URLs to determine their legitimacy.  ...  Motivated by extant literature on weblink information analysis, we improved on the concept of these works to design a new anti-phishing system with significant performance improvement and efficient detection  ... 
doi:10.26480/aim.02.2020.37.44 fatcat:mkq7cpe5fna6xew2gh7hdsf5ge

Efficient and effective realtime prediction of drive-by download attacks

Gaya K. Jayasinghe, J. Shane Culpepper, Peter Bertok
2014 Journal of Network and Computer Applications  
These techniques examine the original or deobfuscated JavaScript source code to assess the potential maliciousness of a webpage.  ...  The proposed method is effective, space efficient, and performs the analysis with low performance overhead, making the approach amenable to in-browser drive-by download detection on resource constrained  ...  As with other dynamic anomaly detection techniques, Opcode analysis is bound by the underlying efficiency of the JavaScript code being executed, and is still susceptible to carefully crafted evasion techniques  ... 
doi:10.1016/j.jnca.2013.03.009 fatcat:374cg7porzh3vljydik34gwuxu

Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing

Shane S. Clark, Benjamin Ransford, Kevin Fu
2012 USENIX Security Symposium  
This paper offers preliminary evidence that the analysis of AC power traces can be both harmful to privacy and beneficial for malware detection, the latter of which may benefit embedded (e.g., medical)  ...  The trend toward energy-proportional computing, in which power consumption scales closely with workload, is making computers increasingly vulnerable to information leakage via whole-system power analysis  ...  It measures the classifier's ability to identify positive examples (i.e., to correctly match an unlabeled webpage sample to a webpage in the training set).  ... 
dblp:conf/uss/ClarkRF12 fatcat:p333w3d55zgcripptrb47i7kcu

User behaviour based phishing websites detection

Xun Dong, John A. Clark, Jeremy L. Jacob
2008 International Multiconference on Computer Science and Information Technology  
Phishing detection systems are principally based on the analysis of data moving from phishers to victims.  ...  In this paper we describe a novel approach to detect phishing websites based on analysis of users' online behaviours -i.e., the websites users have visited, and the data users have submitted to those websites  ...  UBPD is not designed to replace existing techniques. Rather it should be used to complement other techniques, to provide better overall protection.  ... 
doi:10.1109/imcsit.2008.4747332 dblp:conf/imcsit/DongCJ08 fatcat:2cfh4llhuvbyfhxscp6xa37xhu

Defending the weakest link: phishing websites detection by analysing user behaviours

Xun Dong, John A. Clark, Jeremy L. Jacob
2010 Telecommunications Systems  
Phishing detection systems are principally based on the analysis of data moving from phishers to victims.  ...  In this paper we describe a novel approach for detecting phishing websites based on analysis of users' online behavioursi.e., the websites users have visited, and the data users have submitted to those  ...  Acknowledgements We wish to thank all the people helped us, and especially the Engineering and Physical Sciences Research Council(EPSRC) of United Kingdom for their sponsorship of the project "Defending  ... 
doi:10.1007/s11235-009-9247-9 fatcat:xiy2jwwjtbcfrdxq44isaxdzs4

Clustering-based incremental web crawling

Qingzhao Tan, Prasenjit Mitra
2010 ACM Transactions on Information Systems  
We design a crawling algorithm that clusters webpages based on features that correlate to their change frequencies obtained by examining past history.  ...  The crawler downloads a sample of webpages from each cluster and depending upon whether a significant number of these webpages have changed in the last crawl cycle, it decides to recrawl the entire cluster  ...  We adopt the technique here for the incremental crawlers to detect webpages' updates that may affect the performance of search engines.  ... 
doi:10.1145/1852102.1852103 fatcat:fyg3r7hayfg4zjwcvlvv3xhnvy

Energy Efficient CO-GPS with Reduced Duty Cycle Environment Monitoring

Karale P.D, Shinde S.B
2017 IJARCCE  
The LDR is used to measure the light intensity. Gas sensor detects concentration of CO2 of environment.  ...  In many sensing scenarios, preprocessing of location information is adequate at the time of data uploading to a server, Cloud-Offloaded GPS (CO-GPS) solution is designed that allows a sensing device to  ...  5 : 45 Webpage GUI welcome message Sensor data and location information on webpage Figure 6 : 6 Sensor data and location information on GSM phone Efficient power saving techniques must be designed  ... 
doi:10.17148/ijarcce.2017.6624 fatcat:zvhmb2xv3rff7d4cexo4q6qexm

Adaptive Traffic Fingerprinting: Large-scale Inference under Realistic Assumptions [article]

Vasilios Mavroudis, Jamie Hayes
2020 arXiv   pre-print
Our technique achieves ~90% accuracy in a top-15 setting where the model distinguishes the article visited out of 6,000 Wikipedia webpages, while the same model achieves ~80% accuracy in a dataset of 13,000  ...  Traffic fingerprinting attacks allow an adversary to infer the webpage or the website loaded by a user based only on patterns in the user's encrypted traffic.  ...  While this extends beyond the scope of this paper, there is a body of work on efficiently monitoring and detecting changes in millions of webpages for web-archiving purposes [49] , [50]  ... 
arXiv:2010.10294v1 fatcat:siiffdolfjcvjddupgh7yxcn64

Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages

Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, Jin Song Dong
2021 USENIX Security Symposium  
In this work, we design a hybrid deep learning system, Phishpedia, to address two prominent technical challenges in phishing identification, i.e., (i) accurate recognition of identity logos on webpage  ...  Recent years have seen the development of phishing detection and identification approaches to defend against phishing attacks.  ...  Acknowledgement We thank the anonymous reviewers and the shepherd whose comments helped to improve this work.  ... 
dblp:conf/uss/LinLDNCLSZD21 fatcat:66iy4a2hhvcnnmqgedsek6rrua

RPFdb v2.0: an updated database for genome-wide information of translated mRNA generated from ribosome profiling

Hongwei Wang, Ludong Yang, Yan Wang, Leshi Chen, Huihui Li, Zhi Xie
2018 Nucleic Acids Research  
Since its initial release in 2015, the amount of new ribo-seq data has been considerably enlarged with the increasing popularity of ribo-seq technique.  ...  ) More features have been made available to increase database usability.  ...  ACKNOWLEDGEMENTS We would like to thank all the members of Zhi Xie's lab for their testing and assistance as well as many users of RPFdb for their feedback and suggestions.  ... 
doi:10.1093/nar/gky978 pmid:30335166 pmcid:PMC6324049 fatcat:k7qaubidzbb5zl5hwpdwruvem4

Development of A Multi-Client Student Attendance Monitoring System

2019 International journal of recent technology and engineering  
A database was setup to store attendance and student information. It is supported with a web application to view, update and analyze the attendance data  ...  Haar-feature based cascade classifier for object detection and the Scale Invariant Feature Transform Technique (SIFT) technique were implemented for the face authentication process.  ...  The Viola-Jones's detection method was employed by using AdaBoost learning to select best features. All the faces detected are cropped and stored to a designated folder.  ... 
doi:10.35940/ijrte.c1002.1083s19 fatcat:2juysrjv5jgv7h3gzcldutqqwq

Smart, Adaptive Energy Optimization for Mobile Web Interactions [article]

Jie Ren, Lu Yuan, Petteri Nurmi, Xiaoming Wang, Miao Ma, Ling Gao, Zhanyong Tang, Jie Zheng, Zheng Wang
2020 arXiv   pre-print
CAMEL leverages machine learning techniques to develop a smart, adaptive scheme to judiciously trade performance for reduced power consumption.  ...  We apply CAMEL to Chromium and evaluate it on four distinct mobile systems involving 1,000 testing webpages and 30 users.  ...  This enables CAMEL to make energy-efficient scheduling decisions for any new webpage unseen at design time.  ... 
arXiv:2005.00749v1 fatcat:6vnmrv4tozdujbk6fzafqlwxum
« Previous Showing results 1 — 15 out of 7,678 results