Nothing Special   »   [go: up one dir, main page]

Bennett, 2021 - Google Patents

Search Engines That Scan For Internet-Connected Services: Classification and Empirical Study

Bennett, 2021

View PDF
Document ID
7535404066863159771
Author
Bennett C
Publication year

External Links

Snippet

In this thesis, we revisit outdated definitions of Surface Web and Deep Web and provide new definitions and apply them to Internet search engines. We argue that the scope of the term" Web" is too narrow when referring to information on the Internet. We offer, and define, new …
Continue reading at repository.library.carleton.ca (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US10200384B1 (en) Distributed systems and methods for automatically detecting unknown bots and botnets
US9860265B2 (en) System and method for identifying exploitable weak points in a network
Aceto et al. Internet censorship detection: A survey
Velu et al. Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1–the ultimate white hat hackers' toolkit
US8561187B1 (en) System and method for prosecuting dangerous IP addresses on the internet
Tundis et al. A review of network vulnerabilities scanning tools: Types, capabilities and functioning
US20170171244A1 (en) Database deception in directory services
Li et al. Good bot, bad bot: Characterizing automated browsing activity
Akiyama et al. Searching structural neighborhood of malicious urls to improve blacklisting
US20100235915A1 (en) Using host symptoms, host roles, and/or host reputation for detection of host infection
Kondracki et al. Catching transparent phish: Analyzing and detecting mitm phishing toolkits
US20220263852A1 (en) System and method for cybersecurity analysis and score generation for insurance purposes
Srinivasa et al. Open for hire: Attack trends and misconfiguration pitfalls of iot devices
Akiyama et al. HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
US9473516B1 (en) Detecting network attacks based on a hash
Shbair et al. Improving SNI-based HTTPS security monitoring
Serketzis et al. Actionable threat intelligence for digital forensics readiness
García et al. Large scale analysis of doh deployment on the internet
Kondracki et al. The droid is in the details: Environment-aware evasion of android sandboxes
Vermeer et al. SoK: a framework for asset discovery: systematizing advances in network measurements for protecting organizations
So et al. Domains do change their spots: Quantifying potential abuse of residual trust
Velu Mastering Kali Linux for advanced penetration testing
Shivayogimath An overview of network penetration testing
Ansari Web penetration testing with Kali Linux
Liao et al. A comprehensive study of dns operational issues by mining dns forums