Classification of Unknown Web Sites Based on Yearly Changes of Distribution Information of Malicious IP Addresses

Author(s):  
Yoshitaka Nakamura ◽  
Shihori Kanazawa ◽  
Hiroshi Inamura ◽  
Osamu Takahashi
Keyword(s):  
2021 ◽  
Vol 72 (05) ◽  
pp. 538-544
Author(s):  
DANIELA SOFRONOVA ◽  
RADOSTINA A. ANGELOVA

Despite the large application of the machine embroidery in textile and apparel design and high-tech clothing items, there is а lack of systematic arrangement of the digital stitch lines, used by embroidery machines and embroidery designers. Since 2010 information on embroidery stitch lines could be mostly found in the web sites of the embroidery machine manufacturers and software product manuals. However, in the instruction manuals the instruments for creating various embroidery objects are simply described without providing systematic information on the types of the stitch lines. Even more, different names of the stitch lines and different ways to achieve the same design are observed. Single authors offer their own classifications based entirely and logically on the stitches of the hand embroidery. Another group of authors relied on already developed techniques and strategies for digitizing stitches in various software products or took into account the final appearance of the stitch lines or their application. Our study aimed to develop a detailed and systematic classification of the digital stitch lines in the machine embroidery, which has not been presented in the literature.


2010 ◽  
Vol 20 (1) ◽  
pp. 7-15
Author(s):  
Mark Kander

Abstract As of July 2009, speech-language pathologists (SLPs) may bill for Medicare services as private practitioners. This article directs SLPs to the rules for enrollment, necessary approvals by physicians and certain physician substitutes, and proper current procedural terminology (CPT) and International Classification of Diseases, 9th Revision, Clinical Modification (ICD-9-CM) coding when submitting claims. Guidance for determination of the exact payment amount for specific geographic areas is covered as well as determination of local Medicare Administrative Contractor (MAC) Web sites and their local coverage policies for speech-language-voice and dysphagia services. Special rules apply to SLPs who are employees or contractors of physician groups, and these SLPs also may function as private practitioners in physician office settings if they follow certain rules that insulate SLPs from kickback accusations. The rules governing these SLPs are summarized in this article. Questions regarding reimbursement should be directed to the Division 3 Reimbursement Committee or to [email protected] .


2019 ◽  
Vol 9 (23) ◽  
pp. 5102
Author(s):  
Shaukat ◽  
Masood ◽  
Khushi

The World Wide Web has an enormous amount of useful data presented as HTML tables. These tables are often linked to other web pages, providing further detailed information to certain attribute values. Extracting schema of such relational tables is a challenge due to the non-existence of a standard format and a lack of published algorithms. We downloaded 15,000 web pages using our in-house developed web-crawler, from various web sites. Tables from the HTML code were extracted and table rows were labeled with appropriate class labels. Conditional random fields (CRF) were used for the classification of table rows, and a nondeterministic finite automaton (NFA) algorithm was designed to identify simple, complex, hyperlinked, or non-linked tables. A simple schema for non-linked tables was extracted and for the linked-tables, relational schema in the form of primary and foreign-keys (PK and FK) were developed. Child tables were concatenated with the parent table’s attribute value (PK), serving as foreign keys (FKs). Resultantly, these tables could assist with performing better and stronger queries using the join operation. A manual checking of the linked web table results revealed a 99% precision and 68% recall values. Our 15,000-strong downloadable corpus and a novel algorithm will provide the basis for further research in this field.


2016 ◽  
Vol 6 (1) ◽  
pp. 1-12 ◽  
Author(s):  
Ali Al Mazari ◽  
Ahmed H. Anjariny ◽  
Shakeel A. Habib ◽  
Emmanuel Nyakwende

The aim of this paper is to identify common features in: the definition of cyber terrorism, cyber terrorism targets, cyber terrorism crimes and then develop effective mitigation strategies and countermeasures to tackle this phenomenon. Through rigorous analysis of literature covering academic articles and official reports, we develop cyber terrorism definition taxonomy which includes five elements: target, motive, means, effect and intention; cyber terrorism targets taxonomy identified from the following target areas: military forces, government cyber and physical infrastructures, critical national infrastructures, social and national identity, and private industry and entities. The cyber terrorism risk factors are classified into main five categories: national security, financial, social and cultural, operational disruption and physical destructions risks. The following identified patterns constituted the cyber terrorism targets taxonomy: incursion, destruction, service interruption, disinformation and web sites defacement. The authors categorized effective strategic approaches to tackle cyber terrorism as: administrative, technological, national and local alliances, international alliances, and education, training and psychological approach. They developed cyber terrorism taxonomies which represent a systematic organization and classification of knowledge that improves scientific awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies.


2018 ◽  
pp. 608-621 ◽  
Author(s):  
Ali Al Mazari ◽  
Ahmed H. Anjariny ◽  
Shakeel A. Habib ◽  
Emmanuel Nyakwende

The aim of this paper is to identify common features in: the definition of cyber terrorism, cyber terrorism targets, cyber terrorism crimes and then develop effective mitigation strategies and countermeasures to tackle this phenomenon. Through rigorous analysis of literature covering academic articles and official reports, we develop cyber terrorism definition taxonomy which includes five elements: target, motive, means, effect and intention; cyber terrorism targets taxonomy identified from the following target areas: military forces, government cyber and physical infrastructures, critical national infrastructures, social and national identity, and private industry and entities. The cyber terrorism risk factors are classified into main five categories: national security, financial, social and cultural, operational disruption and physical destructions risks. The following identified patterns constituted the cyber terrorism targets taxonomy: incursion, destruction, service interruption, disinformation and web sites defacement. The authors categorized effective strategic approaches to tackle cyber terrorism as: administrative, technological, national and local alliances, international alliances, and education, training and psychological approach. They developed cyber terrorism taxonomies which represent a systematic organization and classification of knowledge that improves scientific awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies.


Sign in / Sign up

Export Citation Format

Share Document