{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

A review of human-and computer-facing url phishing features

K Althobaiti, G Rummani… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
When detecting phishing websites, both humans and computers rely on aspects of the
website (features) to aid in their decision making. In this work, we conduct a review of URL …

Effect of latency on presence in stressful virtual environments

M Meehan, S Razzaque, MC Whitton… - IEEE Virtual Reality …, 2003 - ieeexplore.ieee.org
Previous research has shown that even low end-to-end latency can have adverse effects on
performance in virtual environments (VE). This paper reports on an experiment investigating …

What is this url's destination? empirical evaluation of users' url reading

S Albakry, K Vaniea, MK Wolters - … of the 2020 CHI conference on human …, 2020 - dl.acm.org
Common anti-phishing advice tells users to mouse over links, look at the URL, and compare
to the expected destination, implicitly assuming that they are able to read the URL. To test …

[PDF][PDF] The graph structure in the web: Analyzed on different aggregation levels

R Meusel, S Vigna, O Lehmberg… - The Journal of Web …, 2015 - nowpublishers.com
Knowledge about the general graph structure of the World Wide Web is important for
understanding the social mechanisms that govern its growth, for designing ranking methods …

The decay and failures of web references

D Spinellis - Communications of the ACM, 2003 - dl.acm.org
The decay and failures of web references Page 1 THE wIDESPREAD ADOPTION OF THE
WEB AS A MECHANISM for sharing information has brought with it the corresponding ubiquity …

[HTML][HTML] Advanced evidence collection and analysis of web browser activity

J Oh, S Lee, S Lee - Digital investigation, 2011 - Elsevier
A Web browser is an essential application program for accessing the Internet. If a suspect
uses the Internet as a source of information, the evidence related to the crime would be …

[BOOK][B] Web caching

D Wessels - 2001 - books.google.com
On the World Wide Web, speed and efficiency are vital. Users have little patience for slow
web pages, while network administrators want to make the most of their available …

Extending the representational state transfer (rest) architectural style for decentralized systems

R Khare, RN Taylor - Proceedings. 26th International …, 2004 - ieeexplore.ieee.org
Because it takes time and trust to establish agreement, traditional consensus-based
architectural styles cannot safely accommodate resources that change faster than it takes to …

Open linking in the scholarly information environment using the OpenURL framework

H Van de Sompel, O Beit‐Arie - New Review of Information …, 2001 - Taylor & Francis
This paper provides insights into the concepts underlying the OpenURL framework for open
reference linking in the web‐based scholarly information environment. The discussion starts …