期刊文献+
共找到7,871篇文章
< 1 2 250 >
每页显示 20 50 100
Image Recognition Model of Fraudulent Websites Based on Image Leader Decision and Inception-V3 Transfer Learning
1
作者 Shengli Zhou Cheng Xu +3 位作者 Rui Xu Weijie Ding Chao Chen Xiaoyang Xu 《China Communications》 SCIE CSCD 2024年第1期215-227,共13页
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re... The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models. 展开更多
关键词 fraudulent website image leaders telecom fraud transfer learning
下载PDF
CMAES-WFD:Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
2
作者 Di Wang Yuefei Zhu +1 位作者 Jinlong Fei Maohua Guo 《Computers, Materials & Continua》 SCIE EI 2024年第5期2253-2276,共24页
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de... Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on deep neural network(DNN)can performfeature engineering and attain accuracy rates of over 98%,research has demonstrated thatDNNis vulnerable to adversarial samples.As a result,many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success.However,these methods suffer from high bandwidth overhead or require access to the target model,which is unrealistic.This paper proposes CMAES-WFD,a black-box WF defense based on adversarial samples.The process of generating adversarial examples is transformed into a constrained optimization problem solved by utilizing the Covariance Matrix Adaptation Evolution Strategy(CMAES)optimization algorithm.Perturbations are injected into the local parts of the original traffic to control bandwidth overhead.According to the experiment results,CMAES-WFD was able to significantly decrease the accuracy of Deep Fingerprinting(DF)and VarCnn to below 8.3%and the bandwidth overhead to a maximum of only 14.6%and 20.5%,respectively.Specially,for Automated Website Fingerprinting(AWF)with simple structure,CMAES-WFD reduced the classification accuracy to only 6.7%and the bandwidth overhead to less than 7.4%.Moreover,it was demonstrated that CMAES-WFD was robust against adversarial training to a certain extent. 展开更多
关键词 Traffic analysis deep neural network adversarial sample TOR website fingerprinting
下载PDF
基于Silverlight+Websites的管理技术方案研究 被引量:1
3
作者 李洋 《中国新通信》 2014年第20期109-110,共2页
Silverlight开发平台具有灵活的编程,良好的用户体验,强大的功能特点。Websites把GIS和Web有机结合,是因特网技术应用于GIS开发的产物,Web对GIS实现了扩展和完善。基于Silverlight+Websites的研究,具有良好的扩展性和交互性,应用前景广... Silverlight开发平台具有灵活的编程,良好的用户体验,强大的功能特点。Websites把GIS和Web有机结合,是因特网技术应用于GIS开发的产物,Web对GIS实现了扩展和完善。基于Silverlight+Websites的研究,具有良好的扩展性和交互性,应用前景广阔。本文从Silverlight开发与分析、Auto CAD和Websites的关键技术、基于Silverlight+Websites开发技术路线、管理建模四个方面进行了详细的探讨。 展开更多
关键词 SILVERLIGHT websites 管理技术 研究
下载PDF
从The Great Websites for Kids看儿童网络资源的组织管理与评价 被引量:1
4
作者 宋玉梅 《图书馆杂志》 CSSCI 北大核心 2017年第3期77-83,共7页
从机构组织、评价流程、评价标准、资源组织等方面,对美国最大的儿童网络资源导航The Great Websites for Kids(GWS)进行评述,为我国儿童网络资源的建设、管理、评价和推介提供参考。
关键词 儿童网络资源 GWS 资源评价 资源组织
下载PDF
Brief analysis of Blog Websites’ business models
5
作者 魏娟 《大众商务(下半月)》 2009年第10期290-290,共1页
关键词 信用卡 设备 管理 维护
下载PDF
Phishing Websites Detection by Using Optimized Stacking Ensemble Model 被引量:1
6
作者 Zeyad Ghaleb Al-Mekhlafi Badiea Abdulkarem Mohammed +5 位作者 Mohammed Al-Sarem Faisal Saeed Tawfik Al-Hadhrami Mohammad T.Alshammari Abdulrahman Alreshidi Talal Sarheed Alshammari 《Computer Systems Science & Engineering》 SCIE EI 2022年第4期109-125,共17页
Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such atta... Phishing attacks are security attacks that do not affect only individuals’or organizations’websites but may affect Internet of Things(IoT)devices and net-works.IoT environment is an exposed environment for such attacks.Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users.Machine and deep learning and other methods were used to design detection methods for these attacks.However,there is still a need to enhance detection accuracy.Optimization of an ensemble classification method for phishing website(PW)detection is proposed in this study.A Genetic Algo-rithm(GA)was used for the proposed method optimization by tuning several ensemble Machine Learning(ML)methods parameters,including Random Forest(RF),AdaBoost(AB),XGBoost(XGB),Bagging(BA),GradientBoost(GB),and LightGBM(LGBM).These were accomplished by ranking the optimized classi-fiers to pick out the best classifiers as a base for the proposed method.A PW data-set that is made up of 4898 PWs and 6157 legitimate websites(LWs)was used for this study's experiments.As a result,detection accuracy was enhanced and reached 97.16 percent. 展开更多
关键词 Phishing websites ensemble classifiers optimization methods genetic algorithm
下载PDF
Information Network Systems and Information Sharing on Administrative Websites 被引量:1
7
作者 HIROTA Denjiro 《Journal of Electronic Science and Technology of China》 2004年第3期64-69,共6页
In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also gen... In Japanese 'e-government' policy, called 'e-Japan', the 'administrative document management system' is functioning as information searching systems. On the other hand, this system has also generated the problem that it is not fully functioning as a means for the information sharing in a governmental agency. So, the purpose of this research is to find how the administrative document management system can function as information sharing in administrative organization. For this purpose, this paper considers the current status and some problems firstly. And secondary, this paper proposes the idea and constructs some information systems using administrative official Website. This is the method and approach of this research. As a conclusion, this proposal information system junctions as information sharing support systems. 展开更多
关键词 information network information sharing administrative websites information management systems document management systems
下载PDF
Learning Association Rules and Tracking the Changing Concepts on Webpages:An Effective Pornographic Websites Filtering Approach
8
作者 Jyh-Jian Sheu 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第1期24-36,共13页
We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornog... We applied the decision tree algorithm to learn association rules between webpage’s category(pornographic or normal) and the critical features.Based on these rules, we proposed an efficient method of filtering pornographic webpages with the following major advantages: 1) a weighted window-based technique was proposed to estimate for the condition of concept drift for the keywords found recently in pornographic webpages; 2) checking only contexts of webpages without scanning pictures; 3) an incremental learning mechanism was designed to incrementally update the pornographic keyword database. 展开更多
关键词 Concept drift data mining decision tree pornographic websites filtering
下载PDF
Documental Quality of Websites Concerning Physical Activity, Lifestyle and Sedentarism Available on the Internet
9
作者 Marcos Bagrichevsky Paulo Roberto Vasconcellos-Silva 《Health》 2019年第12期1684-1692,共9页
Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Meth... Objectives: To analyze the documental quality of 389 websites in Portuguese about physical activity, healthy lifestyles and sedentary lifestyles found on the Brazilian version of the general search engine Google. Methods: The documental quality of the 389 websites was estimated based upon the following parameters: 1) a combination of quality criteria from the Health Information Locator (LIS—OPS/BIREME) and those from Chile’s Pontifical Catholic University, organized into 17 variables;2) uniformity of reference criteria (Vancouver);3) association between the presence of authorship and a higher number of the quality criteria being fulfilled. We also studied the ranking of the results presented by Google in addition to attributes connected to the websites’ target audience, the types of content, their sponsors and country of origin. Results: Of the 389 websites studied, 111 links were not active (28.53% CI 95% [24.05 - 33.02]) and none of the websites in the sample met all of the 17 quality variables. Authored websites displayed remarkable differences in quality when compared to those which did not identify their authors. Conclusions: Faced with the issue of the proliferation of websites with questionable quality content, and the fact that the ranking of results interferes directly in the internal evaluation of content relevance, we propose that public-health research institutions cooperate with web-searching developers to improve the website-positioning formula, in which the “identified authorship” criterion should play a major role in the ranking system. 展开更多
关键词 HEALTH Information websites Documental Quality PHYSICAL ACTIVITY
下载PDF
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
10
作者 Daisuke Miyamoto Hiroaki Hazeyama +1 位作者 Youki Kadobayashi Takeshi Takahashi 《Journal of Intelligent Learning Systems and Applications》 2012年第4期319-329,共11页
This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions... This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost. 展开更多
关键词 Detection of PHISHING Sites TRUST DECISION CREDIBILITY of websites Machine Learning Cluster ANALYSIS
下载PDF
A Study on C-E Translation of Product Introductory Texts on Company Websites Under Skopos Theory
11
作者 ZHANG Man CHEN Xiao-xiao 《Journal of Literature and Art Studies》 2019年第3期347-353,共7页
This paper takes the C-E translation of product introductory texts on official websites of three mobile phone makers as the study object under the Skopos theory, with an aim to identify and analyze the distinctive tra... This paper takes the C-E translation of product introductory texts on official websites of three mobile phone makers as the study object under the Skopos theory, with an aim to identify and analyze the distinctive translation features of such special type of text. The exhausted parse and analysis bring out the findings that there exists a significant translation difference between the Chinese and English-version product introductory texts on official websites. It is found that Chinese introductory texts are more inclined to rely on exquisite words and redundant expressions to describe products’ features and functions, while switching to the corresponding English version, simple vocabularies and compact sentence structure are more frequent. Hereafter, this paper raises two practical guidelines to instruct translation activities in business contexts. 展开更多
关键词 Skopos theory PRODUCT introductory TEXTS COMPANY websitE C-E TRANSLATION
下载PDF
Evaluation and Comparison Research on the Support of Websites to Enterprise's E-Commerce
12
作者 SHAO Peiji, HUANG Yixiao, WAN Jie, YANG Jing ( School of Management, University of Electronic Science and Techonology of China Chengdu 610054 China Johnson & Johnson, Philadelphia PA 19104 USA) 《Journal of Electronic Science and Technology of China》 2004年第3期162-166,193,共6页
This paper comparatively analyzes the existing evaluation index of websites, and puts forward the evaluation index and method about the support of a website to enterprise's e-commerce. Through researching on 56 su... This paper comparatively analyzes the existing evaluation index of websites, and puts forward the evaluation index and method about the support of a website to enterprise's e-commerce. Through researching on 56 super enterprises of information industry in Sichuan province, throughout China and the world, analyzing and comparatively studying the support ability of a website to an enterprise's e-commerce, this paper brings forward using five levels to categorize the support ability of a website to enterprise's e-commerce. In the end, the flaw of enterprise's e-commerce practice in Sichuan province and corresponding countermeasure will be illustrated. 展开更多
关键词 E-COMMERCE websites EVALUATION
下载PDF
Growth Model of Local Government Websites
13
作者 HO Sho IIJIMA Junichi 《Journal of Electronic Science and Technology of China》 2004年第3期156-161,共6页
To clarify the concept framework to assess web based information systems (WIS) evolution from an information perspective instead of the usual systems perspective, and to seek for in-depth understanding of maturing pat... To clarify the concept framework to assess web based information systems (WIS) evolution from an information perspective instead of the usual systems perspective, and to seek for in-depth understanding of maturing patterns of WISs based on the framework, several central concepts related to the information aspect of WIS are firstly discussed, then a growth model of local government websites based on a survey study is proposed. 展开更多
关键词 growth model information space local government websitE
下载PDF
Welcome to Visit the Websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
14
《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2011年第1期272-272,共1页
Publisher Acta Geologica Sinica-English Edition is published by Blackwell Publishing Asia Pty Ltd 155 Cremorne Street Richmond Vic.3121,Australia Tel:+61(0)3 9274 3100 Fax:+61(0)3 9274 3101
关键词 Email www Welcome to Visit the websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
下载PDF
Welcome to Visit the Websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
15
《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2012年第2期I0002-I0002,共1页
关键词 Welcome to Visit the websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
下载PDF
Websites
16
《海外英语》 2010年第12期15-15,共1页
本期Functional Language,带您体验网页的相关表达……
关键词 websites 英语学习 学习方法 阅读
下载PDF
Multimodal Fraudulent Website Identification Method Based on Heterogeneous Model Ensemble
17
作者 Shengli Zhou Linqi Ruan +1 位作者 Qingyang Xu Mincheng Chen 《China Communications》 SCIE CSCD 2023年第5期263-274,共12页
The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimensi... The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimension and venerability to anti-reconnaissance,this paper adopts the Stacking,the ensemble learning algorithm,combines multiple modalities such as text,image and URL,and proposes a multimodal fraudulent website identification method by ensembling heterogeneous models.Crossvalidation is first used in the training of multiple largely different base classifiers that are strong in learning,such as BERT model,residual neural network(ResNet)and logistic regression model.Classification of the text,image and URL features are then performed respectively.The results of the base classifiers are taken as the input of the meta-classifier,and the output of which is eventually used as the final identification.The study indicates that the fusion method is more effective in identifying fraudulent websites than the single-modal method,and the recall is increased by at least 1%.In addition,the deployment of the algorithm to the real Internet environment shows the improvement of the identification accuracy by at least 1.9%compared with other fusion methods. 展开更多
关键词 telecom fraud crime fraudulent website data fusion deep learning
下载PDF
Welcome to Visit the Websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
18
《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2014年第5期1622-1622,共1页
关键词 Welcome to Visit the websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
下载PDF
Welcome to Visit the Websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
19
《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2013年第4期I0002-I0002,共1页
Acta Geologica Sinicawww.geoj ournals.cn/dzxb/ch/index.aspx Acta Geoscientica Sinicawww.cagsbulletin.com/dqxbcn/ch/index.aspx Geological Reviewwww.geojournals.cn/georev/ch/index.aspx
关键词 Welcome to Visit the websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
下载PDF
Welcome to Visit the Websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
20
《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2013年第5期I0002-I0002,共1页
关键词 Welcome to Visit the websites of Partial Key Academic Journals from the Geological Society of China and the Chinese Academy of Geological Sciences
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部