Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,396,406 papers from all fields of science
Search
Sign In
Create Free Account
Semantic URL attack
In a semantic URL attack, a client manually adjusts the parameters of its request by maintaining the URL's syntax but altering its semantic meaning…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Client (computing)
Common Gateway Interface
Cross-site scripting
HTTP cookie
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
TEXT MINING MENGGUNAKAN GENERATE ASSOCIATION RULE WITH WEIGHT (GARW) ALGORITHM UNTUK ANALISIS TEKS WEB CRAWLER
Zulkifli Arsyad
INTERNAL (Information System Journal)
2020
Corpus ID: 214279009
Text mining is widely used to find hidden patterns and information in a large number of semi and unstructured texts. Text mining…
Expand
2019
2019
Detecting Malicious Websites by Query Templates
Satomi Kaneko
,
A. Yamada
,
Yukiko Sawaya
,
Tran Thao Phuong
,
A. Kubota
,
Kazumasa Omote
International Conference on Security for…
2019
Corpus ID: 212564520
With the development of the Internet, web content is exponentially increasing. Along with this, web-based attacks such as drive…
Expand
2019
2019
Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists
Simon Bell
,
K. Paterson
,
L. Cavallaro
arXiv.org
2019
Corpus ID: 208637375
With more than 500 million daily tweets from over 330 million active users, Twitter constantly attracts malicious users aiming to…
Expand
2015
2015
AutoBLG: Automatic URL blacklist generator using search space expansion and filters
Bo Sun
,
Mitsuaki Akiyama
,
Takeshi Yagi
,
Mitsuhiro Hatada
,
Tatsuya Mori
International Symposium on Computers and…
2015
Corpus ID: 35585954
Modern web users are exposed to a browser security threat called drive-by-download attacks that occur by simply visiting a…
Expand
Review
2015
Review
2015
Spammer success through customization and randomization of URLs
Gary Warner
,
D. Rajani
,
M. Nagy
APWG Symposium on Electronic Crime Research
2015
Corpus ID: 27325419
Spam researchers and security personnel require a method for determining whether the URLs embedded in email messages are safe or…
Expand
2014
2014
Asian or Human Values: A Never-Ending Dispute
Arnaldo M. A. Gonçalves
2014
Corpus ID: 154947000
The debate as regards the universality of Human Rights is continuing in the dialogue between the East and the West and has…
Expand
2013
2013
A FRAMEWORK FOR GOOD CORPORATE GOVERNANCE AND ORGANISATIONAL LEARNING – AN EMPIRICAL STUDY
Wayne D. Kearney
,
H. Kruger
2013
Corpus ID: 1888855
. The importance of applying good governance principles has grown over the past decade and many studies have been performed to…
Expand
2011
2011
Poster: CUD: crowdsourcing for URL spam detection
Jun Hu
,
Hongyu Gao
,
Zhichun Li
,
Yan Chen
Conference on Computer and Communications…
2011
Corpus ID: 8424122
The prevalence of spam URLs in Internet services, such as email, social networks, blogs and online forums has become a serious…
Expand
2011
2011
CUD : Crowdsourcing for URL Spam Detection PaperID
2011
Corpus ID: 15311654
The prevalence of spam URLs in Internet services, such as email, social networks, blogs and online forums has become a serious…
Expand
2009
2009
A Study on effective usage of the URL Blacklists
Matsuki Takahiro
,
Arai Yuu
2009
Corpus ID: 57734374
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE