Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleAugust 2023
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities
Security and Privacy in Social Networks and Big DataAug 2023, pp 149–163https://doi.org/10.1007/978-981-99-5177-2_9AbstractRansomware attacks and the use of the dark web forums are two serious contemporary cyber-problems. These two areas have been investigated separately in the past, but there is currently a gap in our understanding with regard to the interactions ...
- research-articleOctober 2022
PhishInPatterns: measuring elicited user interactions at scale on phishing websites
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferenceOctober 2022, pp 589–604https://doi.org/10.1145/3517745.3561467Despite phishing attacks and detection systems being extensively studied, phishing is still on the rise and has recently reached an all-time high. Attacks are becoming increasingly sophisticated, leveraging new web design patterns to add perceived ...
- rfcSeptember 2022
RFC 9309: Robots Exclusion Protocol
This document specifies and extends the "Robots Exclusion Protocol" method originally defined by Martijn Koster in 1994 for service owners to control how content served by their services may be accessed, if at all, by automatic clients known as crawlers. ...
- research-articleFebruary 2022
Web specific information detection based on features and deep neural network
ACAI '21: Proceedings of the 2021 4th International Conference on Algorithms, Computing and Artificial IntelligenceDecember 2021, Article No.: 77, pp 1–7https://doi.org/10.1145/3508546.3508623Internet information is spreading rapidly, and the task of detecting web specific information is arduous. To solve this problem, this paper proposes a web specific information detection method that combines features and deep neural network (DNN). It ...
- abstractJune 2021
A Measurement Study of Wechat Mini-Apps
SIGMETRICS '21: Abstract Proceedings of the 2021 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer SystemsMay 2021, pp 19–20https://doi.org/10.1145/3410220.3460106A new mobile computing paradigm, dubbed mini-app, has been growing rapidly over the past few years since being introduced by WeChat in 2017. In this paradigm, a host app allows its end-users to install and run mini-apps inside itself, enabling the host ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 49 Issue 1June 2021 -
- research-articleJune 2021
A Measurement Study of Wechat Mini-Apps
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 5, Issue 2Article No.: 14, pp 1–25https://doi.org/10.1145/3460081A new mobile computing paradigm, dubbed mini-app, has been growing rapidly over the past few years since being introduced by WeChat in 2017. In this paradigm, a host app allows its end-users to install and run mini-apps inside itself, enabling the host ...
- research-articleJanuary 2020
Browser simulation-based crawler for online social network profile extraction
International Journal of Web Based Communities (IJWBC), Volume 16, Issue 42020, pp 321–342https://doi.org/10.1504/ijwbc.2020.111377The rapid proliferation and extensive use of online social networks (OSNs) like Facebook, Twitter, Instagram, etc., has attracted the attention of academia and industry, since these networks store massive information in them. But, acquiring data from ...
- research-articleJanuary 2020
Extracting and searching news articles in web portal news pages
International Journal of Computational Vision and Robotics (IJCVR), Volume 10, Issue 32020, pp 202–212https://doi.org/10.1504/ijcvr.2020.107241Recently, a large amount of news articles is being created online, and news articles are important resources for understanding social phenomena and trends. Accordingly, a web portal service provides a 'portal news page' that classifies news articles ...
- research-articleDecember 2019
Combining URL and HTML Features for Entity Discovery in the Web
ACM Transactions on the Web (TWEB), Volume 13, Issue 4Article No.: 20, pp 1–27https://doi.org/10.1145/3365574The web is a large repository of entity-pages. An entity-page is a page that publishes data representing an entity of a particular type, for example, a page that describes a driver on a website about a car racing championship. The attribute values ...
- research-articleOctober 2018
Hyperlink is not dead!
WS.2 2018: Proceedings of the 2nd International Conference on Web StudiesOctober 2018, pp 12–18https://doi.org/10.1145/3240431.3240434The emergence and success of web platforms nurtured a trend within social studies: "Hyperlink is dead!". Capturing their users into mobile applications and specialised web interface to propose them a specific user experience (and business model), the ...
- research-articleFebruary 2018
Developing a graph-based system for storing, exploiting and visualizing text stream
ICMLSC '18: Proceedings of the 2nd International Conference on Machine Learning and Soft ComputingFebruary 2018, pp 82–86https://doi.org/10.1145/3184066.3184084In an era of information explosion, collecting and exploiting information automatically is very essential so that many studies have proposed models for solving storage problems and supporting efficient data processing. In this paper, we propose a system ...
- ArticleNovember 2014
Real Time Detection System for Malicious URLs
CICN '14: Proceedings of the 2014 International Conference on Computational Intelligence and Communication NetworksNovember 2014, pp 856–860https://doi.org/10.1109/CICN.2014.181Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get ...
- research-articleOctober 2013
A scalable crawler framework for FLOSS data
Internetware '13: Proceedings of the 5th Asia-Pacific Symposium on InternetwareOctober 2013, Article No.: 8, pp 1–7https://doi.org/10.1145/2532443.2532454Free / Libre / Open Source Software (FLOSS) data, such as bug reports, mailing lists and related webpages, contains valuable information for reusing open source software projects. Before conducting further experiment on FLOSS data, researchers often ...
- ArticleJune 2013
CUVIM: extracting fresh information from social network
WAIM'13: Proceedings of the 14th international conference on Web-Age Information ManagementJune 2013, pp 351–362https://doi.org/10.1007/978-3-642-38562-9_36Social network preserves the life of users and provides great potential for journalists, sociologists and business analysts. Crawling data from social network is a basic step for social network information analysis and processing. As the network becomes ...
- ArticleJune 2012
Design and Implementation of Facebook Crawler Based on Interaction Simulation
TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and CommunicationsJune 2012, pp 1109–1112https://doi.org/10.1109/TrustCom.2012.121The extensive use of Online Social Networks (OSNs) has attracted such wide attention of academia that OSNs have become a hot topic. Based on the interaction simulation, we have designed and implemented a Facebook crawler, which can obtain the complete ...
- ArticleJune 2012
The Crawler of Specific Resources Recognition Based on Multi-thread
CSO '12: Proceedings of the 2012 Fifth International Joint Conference on Computational Sciences and OptimizationJune 2012, pp 569–572https://doi.org/10.1109/CSO.2012.130With the development of computer network and widely used of Internet, online information increases in broadband level exponentially, the difficulty and complexity of information retrieval also increase gradually, so the Crawler is developing rapidly. ...
- ArticleMay 2012
Illicit activities and terrorism in cyberspace: an exploratory study in the southeast asian region
PAISI'12: Proceedings of the 2012 Pacific Asia conference on Intelligence and Security InformaticsMay 2012, pp 27–35https://doi.org/10.1007/978-3-642-30428-6_2Cyberspace is an attractive medium for computer-savvy generation of terrorists due to its anonymity, psychological impact and also it's potential to inflict massive damage. There have been numerous studies by researchers in Europe, the Middle East and ...
- ArticleOctober 2011
Information Retrieval from the Web and Application of Migrating Crawler
CICN '11: Proceedings of the 2011 International Conference on Computational Intelligence and Communication NetworksOctober 2011, pp 476–480https://doi.org/10.1109/CICN.2011.99Study reports that about 40% of current internet traffic and bandwidth consumption is due to the web crawlers that retrieve pages for indexing by the different search engines. As the size of the web continues to grow, searching it for useful information ...
- ArticleNovember 2010
LDspider: an open-source crawling framework for the web of linked data
ISWC-PD'10: Proceedings of the 2010 International Conference on Posters & Demonstrations Track - Volume 658November 2010, pp 29–32The Web of Linked Data is growing and currently consists of several hundred interconnected data sources altogether serving over 25 billion RDF triples to the Web. What has hampered the exploitation of this global dataspace up till now is the lack of an ...
- articleAugust 2010
An active crawler for discovering geospatial Web services and their distribution pattern-A case study of OGC Web Map Service
International Journal of Geographical Information Science (IJGIS), Volume 24, Issue 8August 2010, pp 1127–1147https://doi.org/10.1080/13658810903514172The increased popularity of standards for geospatial interoperability has led to an increasing number of geospatial Web services (GWSs), such as Web Map Services (WMSs), becoming publicly available on the Internet. However, finding the services in a ...