Skip to search formSkip to main contentSkip to account menu

Semantic URL attack

In a semantic URL attack, a client manually adjusts the parameters of its request by maintaining the URL's syntax but altering its semantic meaning… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Text mining is widely used to find hidden patterns and information in a large number of semi and unstructured texts. Text mining… 
2019
2019
With the development of the Internet, web content is exponentially increasing. Along with this, web-based attacks such as drive… 
2019
2019
With more than 500 million daily tweets from over 330 million active users, Twitter constantly attracts malicious users aiming to… 
2015
2015
Modern web users are exposed to a browser security threat called drive-by-download attacks that occur by simply visiting a… 
Review
2015
Review
2015
Spam researchers and security personnel require a method for determining whether the URLs embedded in email messages are safe or… 
2014
2014
The debate as regards the universality of Human Rights is continuing in the dialogue between the East and the West and has… 
2013
2013
. The importance of applying good governance principles has grown over the past decade and many studies have been performed to… 
2011
2011
The prevalence of spam URLs in Internet services, such as email, social networks, blogs and online forums has become a serious… 
2011
2011
  • 2011
  • Corpus ID: 15311654
The prevalence of spam URLs in Internet services, such as email, social networks, blogs and online forums has become a serious…