URL redirection

Known as: Redirect pages, Web redirection, Mod-rewrite 
URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address. When a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Web services like social networks, video streaming sites, etc. draw numerous viewers daily. This popularity makes them attractive… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 4
Is this relevant?
2013
2013
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. Conventional Twitter spam… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Twitter can suffer from malicious tweets containing suspicious URLs for spam, phishing, and malware distribution. Previous… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
On the heels of the widespread adoption of web services such as social networks and URL shorteners, scams, phishing, and malware… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Data centers deploy a variety of middleboxes (e.g., firewalls, load balancers and SSL offloaders) to protect, manage and improve… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Content stealing in the web is becoming a serious concern for information and e-commerce websites. In the practices known as web… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The change to the minimum school-leaving age in the United Kingdom from 14 to 15 had a powerful and immediate effect that… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Cloaking and redirection are two possible search engine spamming techniques. In order to understand cloaking and redirection on… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Intrusion detection systems that monitor sequences of system calls have recently become more sophisticated in defining legitimate… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1994
1994
This paper describes the Internet Mobile Host Protocol (IMHP), which allows transparent routing of IP packets to mobile hosts in… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?