To see the other types of publications on this topic, follow the link: Internet Browser.

Journal articles on the topic 'Internet Browser'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet Browser.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR." Indonesian Journal of Business Intelligence (IJUBI) 1, no. 1 (2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.

Full text
Abstract:
Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser its
APA, Harvard, Vancouver, ISO, and other styles
2

Mendel, Alan. "PDM and the Internet." Mechanical Engineering 121, no. 09 (1999): 60–63. http://dx.doi.org/10.1115/1.1999-sep-3.

Full text
Abstract:
Internet technology is reshaping the product data management (PDM) software business. Product data management on the Internet is a natural extension of this distributed arrangement. The Web browser essentially becomes a new kind of client, one that's uniform across all applications. Currently, most PDM servers are simply not configured to handle so many concurrent users, and the processing burden assumed by the client in the client/ server system shifts to the server in a browser-based system. One of the main reasons for the increase in Internet activity for PDM is the success of the World Wid
APA, Harvard, Vancouver, ISO, and other styles
3

Gangele, Sharad, Sunil Patil, Diwakar Shukla, and Rahul Singhai. "A Novel Way for Area Computation of Browser Sharing Phenomena through Implementation of Simpson's 1/3 Method." COMPUSOFT: An International Journal of Advanced Computer Technology 06, no. 05 (2017): 2347–54. https://doi.org/10.5281/zenodo.14803288.

Full text
Abstract:
An Internet browser is a rapidly developing technology, which has carried substantial changes and opportunities to numerous zone. Modern web browsers afford various supportive features and mostly utilize for revealing and accessing websites on the Internet. Shukla and Singhai (2011) need special mention as they have developed a browser sharing phenomenon. Mainly, when two browsers installed in a computer system, also produces a mathematical relationship between browser sharing and browser failure probability. However, These expressions comprises of probability based quadric form having definit
APA, Harvard, Vancouver, ISO, and other styles
4

Hasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J, and Hejase Ale J. "Forensic analysis of private browsing mechanisms: Tracing internet activities." Journal of Forensic Science and Research 5, no. 1 (2021): 012–19. http://dx.doi.org/10.29328/journal.jfsr.1001022.

Full text
Abstract:
Forensic analysts are more than ever facing challenges upon conducting their deep investigative analysis on digital devices due to the technological progression. Of these are the difficulties present upon analyzing web browser artefacts as this became more complicated when web browser companies introduced private browsing mode, a feature aiming to protect users’ data upon opening a private browsing session, by leaving no traces of data on the local device used. Aiming to investigate whether the claims of web browser companies are true concerning the protection private browsing provides to the
APA, Harvard, Vancouver, ISO, and other styles
5

Shoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2023): 1–11. http://dx.doi.org/10.48001/joitml.2023.111-11.

Full text
Abstract:
The Internet of Things is the concept of a data network between devices (things) smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives images f
APA, Harvard, Vancouver, ISO, and other styles
6

Shoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2024): 1–8. http://dx.doi.org/10.48001/joitml.2024.111-8.

Full text
Abstract:
The Internet of Things is the concept of a data network between devices ("things"): smart mobile phones, smart refrigerators, smart watches, virtual assistants like Internet browsers, etc., equipped with built-in tools and technologies for each to interact with each other or with external environment. JavaScript was created to bring any browser web page to life and easily apply it to the Internet of Things host client method, which runs JavaScript on its host device (such as a smartphone) and sends signals with it to client devices such as drones cameras or security cameras, and receives image
APA, Harvard, Vancouver, ISO, and other styles
7

Ricart, Glenn. "The Mosaic Internet Browser." Computers in Physics 8, no. 3 (1994): 249. http://dx.doi.org/10.1063/1.4823294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhadarage, Shubham. "Browser Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31830.

Full text
Abstract:
Web browsers play a crucial role in accessing and interacting with information on the internet. However, they also present significant security challenges due to their complexity and the diverse range of threats they face. This paper provides an overview of web browser security, focusing on the key challenges, vulnerabilities, and defences. It discusses common attack vectors, such as cross-site scripting (XSS) and cross-site request forgery (CSRF), as well as browser security features like sandboxing, secure storage, and Content Security Policy (CSP). Additionally, the paper explores emerging
APA, Harvard, Vancouver, ISO, and other styles
9

SahinurHossen, Mohammad, Rakibul Islam, Md Nasef Ur Rahman Chowdhury, Ahshanul Haque, and Qudrat E. Alahy Ratul. "Malware Detection in Web Browser Plugins Using API Calls with Permissions." International Journal of Advanced Networking and Applications 14, no. 06 (2023): 5672–77. http://dx.doi.org/10.35444/ijana.2023.14603.

Full text
Abstract:
With the exponential growth of internet users, web browsers play an essential role in gathering knowledge, social networking etc. Browser plugin/add-on is a unique feature of modern browsers that allows for adding new gimmicks to the browser functionality. Although this tool is handy, it poses a significant risk as it can collect and store users browsing history, passwords and more. Hence, attackers can try injecting malicious browser add-ons that can utilize security loopholes wherein the attacker may access user-critical data on the host device. The Smart Extension Malware Detector (SEMD), a
APA, Harvard, Vancouver, ISO, and other styles
10

Tamary, Jonathan, and Dror G. Feitelson. "The rise of Chrome." PeerJ Computer Science 1 (October 28, 2015): e28. http://dx.doi.org/10.7717/peerj-cs.28.

Full text
Abstract:
Since Chrome’s initial release in 2008 it has grown in market share, and now controls roughly half of the desktop browsers market. In contrast with Internet Explorer, the previous dominant browser, this was not achieved by marketing practices such as bundling the browser with a pre-loaded operating system. This raises the question of how Chrome achieved this remarkable feat, while other browsers such as Firefox and Opera were left behind. We show that both the performance of Chrome and its conformance with relevant standards are typically better than those of the two main contending browsers,
APA, Harvard, Vancouver, ISO, and other styles
11

Fajar, Abdullah, Setiadi Yazid, ., and . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, no. 4.44 (2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.

Full text
Abstract:
Web Browser play the important mandatory role in accessing the application through the internet and may carry malicious content to the system hence threatening the system from the attacker. Google Chrome is one of popular browser since released on 2008 as one of product of Chromium Project at Google. Chrome is fourth ranking in Common Vulnerabilities Enumeration website and the first ranking among browser that have most of vulnerabilities reported. This paper describe a Descriptive analysis of weakness and vulnerabilities of Chrome browser. The analysis use comparison approach to other popular
APA, Harvard, Vancouver, ISO, and other styles
12

Zadereyko, Оlexander, Olena Trofymenko, Nataliia Loginova, Yuliia Loboda, and Yuliia Prokop. "ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 199–212. http://dx.doi.org/10.28925/2663-4023.2024.23.199212.

Full text
Abstract:
The distribution of the vast majority of web browsers is actively encouraged by their free use. This is a common practice of web browser developers, as it provides them with great opportunities for their distribution. The flip side of this process is the collection of personal data by web browser developers that the user does not control. The collected data is automatically transferred to leading IT companies such as Google, Microsoft, and Cloudflare, which collect, accumulate, process, and monetize the users’ data in an automated manner. This leads to the fact that any web browser user is pro
APA, Harvard, Vancouver, ISO, and other styles
13

Freyberger, Michael, Warren He, Devdatta Akhawe, Michelle L. Mazurek, and Prateek Mittal. "Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers." Proceedings on Privacy Enhancing Technologies 2018, no. 2 (2018): 47–63. http://dx.doi.org/10.1515/popets-2018-0012.

Full text
Abstract:
AbstractAn important line of privacy research is investigating the design of systems for secure input and output (I/O) within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications willonly have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper will explore the limitations of ShadowCrypt in order to provide a foundation for the general princ
APA, Harvard, Vancouver, ISO, and other styles
14

Mustika, Wida Prima, Mardian Mardian, and Rinawati Rinawati. "Analitycal Hierarchy Process Untuk Menganalisa Faktor Pemilihan Web Browser Pada Desktop." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 1 (2018): 83. http://dx.doi.org/10.30645/j-sakti.v2i1.57.

Full text
Abstract:
Convenience in using the internet is strongly influenced by the web browser used. Web browser is an application to be able to surf the internet, which serves to display and interact with the server. The development of the internet and the increasing number of website are there, make the internet as the primary source of information. With options and advantages possessed by each web browser, internet users often do not make the most of the features provided. It is that makes the background of how to apply the research methods Analytical Hierarchy Process (AHP) for choosing a web browser on the
APA, Harvard, Vancouver, ISO, and other styles
15

El-Tayeb, Mahmoud, Ahmed Taha, and Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics." Ingénierie des systèmes d information 26, no. 4 (2021): 337–44. http://dx.doi.org/10.18280/isi.260401.

Full text
Abstract:
In criminal investigations, the digital evidence extracted from social media may provide exceptional support. Reviewing the history or cache of the web browser may provide a valuable insight into the activity of the suspect. The growing popularity of Internet video streaming creates a risk of this technology misuse. There are a few published research on video reconstruction forensics on the Chrome browser. There is a difference in the methods applied to reconstruct cached video on Chrome from the methods applied to Firefox or any browser. Our primary focus in this research is to examine the fo
APA, Harvard, Vancouver, ISO, and other styles
16

Chalyi, Oleksii, Kęstutis Driaunys, and Vytautas Rudžionis. "Assessing Browser Security: A Detailed Study Based on CVE Metrics." Future Internet 17, no. 3 (2025): 104. https://doi.org/10.3390/fi17030104.

Full text
Abstract:
This study systematically evaluates the vulnerabilities of modern web browsers using developed indices derived from the CVE database, including ICVE, ICVSS, IR and IT. These indices incorporate metrics such as vulnerability severity and risks, along with browser popularity, to enable a balanced comparison of browser security. The results highlight significant differences in browser security: while Google Chrome and Samsung Internet exhibited lower threat indices, Mozilla Firefox demonstrated consistently higher scores, indicating greater exposure to risks. These observations a slightly contrad
APA, Harvard, Vancouver, ISO, and other styles
17

Baran, Erkan, Huseyin Çakır, and Çelebi Uluyol. "Web browsers forensic analysis reviewWeb tarayıcılarda adli analiz incelemesi." International Journal of Human Sciences 12, no. 2 (2015): 757. http://dx.doi.org/10.14687/ijhs.v12i2.3244.

Full text
Abstract:
<p>Nowadays, web browser tools are seen ıntensıvely durıng the usage of web applıcatıons. Because of that, browsers provıdes ınfrastructure of a largo majorıty of crımes. Because guılty or suspect can use the browsers to collect ınformatıons, to hıde hıs crıme, learn new crımınal methods or to apply they have learned. In thıs study, ıt ıs also seeked answers of how a process can be monıtored on the computers whıch are used on browsers, ın whıch fıles whıch datas are looked and when and whıch sıtes are accessed. Accordıng to research of W3counter web stats tool, Chrome Web browser, whıch
APA, Harvard, Vancouver, ISO, and other styles
18

Sunitharam, Dr C., Sayimpu Vinay, and Sannapaneni Anand. "Preserving Privacy and Security in Browser Case Study of Mantis Browser." International Journal of Soft Computing and Engineering 12, no. 1 (2022): 1–4. http://dx.doi.org/10.35940/ijsce.a3544.0312122.

Full text
Abstract:
Abstract: The internet was meant to shorten the distance between the people to ground breaking level. It is essential tool for everyday task. But with this, internet service providers are allowed to share and sell their customers web browsing data without their concedence. sometimes, sold data makes security weakened and makes unprecedented way to spammers. With third party trackers, privacy gone under more risk factor, which makes no deterrent for Cyberattacks, terrorism and other phenomena. In today’s hig h tech environment organizations, Government and individual user has to use web browser
APA, Harvard, Vancouver, ISO, and other styles
19

Dr., C. Sunitharam, Vinay Sayimpu, and Anand Sannapaneni. "Preserving Privacy and Security in Browser Case Study of Mantis Browser." International Journal of Soft Computing and Engineering (IJSCE) 12, no. 1 (2022): 1–4. https://doi.org/10.35940/ijsce.A3544.0312122.

Full text
Abstract:
<strong>Abstract: </strong>The internet was meant to shorten the distance between the people to ground breaking level. It is essential tool for everyday task. But with this, internet service providers are allowed to share and sell their customers web browsing data without their concedence. sometimes, sold data makes security weakened and makes unprecedented way to spammers. With third party trackers, privacy gone under more risk factor, which makes no deterrent for Cyberattacks, terrorism and other phenomena. In today&rsquo;s hig h tech environment organizations, Government and individual user
APA, Harvard, Vancouver, ISO, and other styles
20

Abdiati, Agustia Dwi, Santoso Setiawan, and Hendra Supendar. "Pemilihan Web Browser Pada Mobile Menggunakan Metode Analytical Hierachy Process." Jurnal Infortech 3, no. 1 (2021): 26–32. http://dx.doi.org/10.31294/infortech.v3i1.10298.

Full text
Abstract:
Kenyamanan dalam berinternet didukung oleh web browser yang digunakan. Web browser adalah perangkat lunak (software) yang digunakan untuk berselancar dalam dunia internet. Berkat kemajuan teknologi, saat ini web browser dapat digunakan pada mobile. Hal tersebut menjadikan para pengembang web bersaing untuk berinovasi menciptakan web browser yang dapat digunakan pada mobile. Dengan banyaknya pilihan yang ada, menjadikan para pengguna web browser bingung. Web browser apa yang terbaik untuk digunakan pada mobile dan sesuai dengan keinginan. Hal ini menjadi latar belakang penelitian, bagaimana men
APA, Harvard, Vancouver, ISO, and other styles
21

Bensch, Michael, Ahmed A. Karim, Jürgen Mellinger, et al. "Nessi: An EEG-Controlled Web Browser for Severely Paralyzed Patients." Computational Intelligence and Neuroscience 2007 (2007): 1–5. http://dx.doi.org/10.1155/2007/71863.

Full text
Abstract:
We have previously demonstrated that an EEG-controlled web browser based on self-regulation of slow cortical potentials (SCPs) enables severely paralyzed patients to browse the internet independently of any voluntary muscle control. However, this system had several shortcomings, among them that patients could only browse within a limited number of web pages and had to select links from an alphabetical list, causing problems if the link names were identical or if they were unknown to the user (as in graphical links). Here we describe a new EEG-controlled web browser, called Nessi, which overcom
APA, Harvard, Vancouver, ISO, and other styles
22

Michael, Adam. "Caveat browser warning on Internet IPOs." Nature Biotechnology 16, no. 8 (1998): 716. http://dx.doi.org/10.1038/nbt0898-716a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Shukla, Abhishek. "Comparative Analysis of Webkit and Non-Webkit Based Browsers and their Future." Journal of Mathematical & Computer Applications 2, no. 4 (2023): 1–3. http://dx.doi.org/10.47363/jmca/2023(2)130.

Full text
Abstract:
Web browsers have become an integral part of our daily lives, facilitating access to the vast world of information on the internet. While several web browsers are available, they can be broadly categorized into two groups: WebKit-based and non-WebKit-based browsers. This article provides a comprehensive comparative analysis of these two browser categories, discussing their origins, development, key features, and market share, as well as what the future looks like for both of these categories.
APA, Harvard, Vancouver, ISO, and other styles
24

Pramono, Bagus, and Indrastanti Ratna Widiasari. "Membangun Server NVR berbasis Open-Source menggunakan ShinobiCE (Studi Kasus DISKOMINFO Boyolali)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 306–12. http://dx.doi.org/10.35870/jtik.v7i2.778.

Full text
Abstract:
One of the well-known software with high quality content delivery standards is Flash Player. Flash Player has a wide user base, with over 90% internet penetration on connected computers. Since December 31, 2021 Adobe announced that Adobe Flash Player is no longer supported and Adobe has also blocked Flash content from running on browsers so that users can no longer experience the advantages of Flash Player. a player allowed by the browser. Based on these problems, a solution is needed so that Flash Player can run in the browser, namely by building an NVR server using ShinobiCE. Through this re
APA, Harvard, Vancouver, ISO, and other styles
25

Edan, Naktal, and Enas Y. Abdullah. "Design and implementation of a novel secured and wide WebRTC signalling mechanism for multimedia over internet." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5430. http://dx.doi.org/10.11591/ijece.v10i5.pp5430-5435.

Full text
Abstract:
A modern and free technology called web real-time communication (WebRTC) was enhanced to allow browser-to-browser multimedia communication without plugins. In contract, WebRTC has not categorised a specific signalling mechanism to set, establish and end communication between browsers. The primary target of this application is to produce and implement a novel WebRTC signalling mechanism for multimedia communication between different users over the Internet without plugins. Furthermore, it has been applied over different browsers, such as Explorer, Safari, Google Chrome, Firefox and Opera withou
APA, Harvard, Vancouver, ISO, and other styles
26

Naktal, Edan, and Y. Abdullah Enas. "Design and implementation of a novel secured and wide WebRTC signalling mechanism for multimedia over internet." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5430–35. https://doi.org/10.11591/ijece.v10i5.pp5430-5435.

Full text
Abstract:
A modern and free technology called web real-time communication (WebRTC) was enhanced to allow browser-to-browser multimedia communication without plugins. In contract, WebRTC has not categorised a specific signalling mechanism to set, establish and end communication between browsers. The primary target of this application is to produce and implement a novel WebRTC signalling mechanism for multimedia communication between different users over the Internet without plugins. Furthermore, it has been applied over different browsers, such as Explorer, Safari, Google Chrome, Firefox and Opera withou
APA, Harvard, Vancouver, ISO, and other styles
27

Roberts, Caroline, Jessica M. E. Herzing, Marc Asensio Manjon, Philip Abbet, and Daniel Gatica-Perez. "Response Burden and Dropout in a Probability-Based Online Panel Study – A Comparison between an App and Browser-Based Design." Journal of Official Statistics 38, no. 4 (2022): 987–1017. http://dx.doi.org/10.2478/jos-2022-0043.

Full text
Abstract:
Abstract Survey respondents can complete web surveys using different Internet-enabled devices (PCs versus mobile phones and tablets) and using different software (web browser versus a mobile software application, “app”). Previous research has found that completing questionnaires via a browser on mobile devices can lead to higher breakoff rates and reduced measurement quality compared to using PCs, especially where questionnaires have not been adapted for mobile administration. A key explanation is that using a mobile browser is more burdensome and less enjoyable for respondents. There are reas
APA, Harvard, Vancouver, ISO, and other styles
28

Dougan, Timothy, and Kevin Curran. "Man in the Browser Attacks." International Journal of Ambient Computing and Intelligence 4, no. 1 (2012): 29–39. http://dx.doi.org/10.4018/jaci.2012010103.

Full text
Abstract:
Man-in-the-Browser attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking. The security community has been aware of them as such for time but they have grown in ability and success during that time. These attacks are a specialised version of Man-in-the-Middle attack, and operate by stealing authentication data and altering legitimate user transactions to benefit the attackers. This paper examines what Man-in-the-Browser attacks are capable of and how specific versions of the attack are executed, with referen
APA, Harvard, Vancouver, ISO, and other styles
29

Fabisiak, Tomasz, and Arkadiusz Danilecki. "Browser-based Harnessing of Voluntary Computational Power." Foundations of Computing and Decision Sciences 42, no. 1 (2017): 3–42. http://dx.doi.org/10.1515/fcds-2017-0001.

Full text
Abstract:
AbstractComputers connected to internet represent an immense computing power, mostly unused by their owners. One way to utilize this public resource is via world wide web, where users can share their resources using nothing more except their browsers. We survey the techniques employing the idea of browser-based voluntary computing (BBVC), discuss their commonalities, recognize recurring problems and their solutions and finally we describe a prototype implementation aiming at efficient mining of voluntary-contributed computing power.
APA, Harvard, Vancouver, ISO, and other styles
30

Kozlovskis, Dāvis. "A COMPARATIVE STUDY OF THE SPEED AND SECURITY OF INTERNET BROWSERS: GOOGLE CHROME, MOZILLA FIREFOX, MICROSOFT EDGE, BRAVE AND OPERA." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 28 (September 10, 2024): 59–63. http://dx.doi.org/10.17770/het2024.28.8260.

Full text
Abstract:
This study investigates the speed and security of five internet browsers: Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, and Opera. Evaluating startup time, search speed, webpage loading, and security features including VPN and AdBlocker, it identifies variations in data collection and privacy practices. Notably, Opera demonstrates the highest security with minimal third-party connections. However, concerns arise with Microsoft Edge's data aggregation practices. This research underscores the importance of considering both speed and security when selecting a browser, contributing to inf
APA, Harvard, Vancouver, ISO, and other styles
31

Sy, Erik, Christian Burkert, Hannes Federrath, and Mathias Fischer. "A QUIC Look at Web Tracking." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 255–66. http://dx.doi.org/10.2478/popets-2019-0046.

Full text
Abstract:
Abstract QUIC has been developed by Google to improve the transport performance of HTTPS traffic. It currently accounts for approx. 7% of the global Internet traffic. In this work, we investigate the feasibility of user tracking via QUIC from the perspective of an online service. Our analysis reveals that the protocol design contains violations of privacy best practices through which a tracker can passively and uniquely identify clients across several connections. This tracking mechanisms can achieve reduced delays and bandwidth requirements compared to conventional browser fingerprinting or H
APA, Harvard, Vancouver, ISO, and other styles
32

Kakar, Abdul Sattar, and Muhammad Sadiq Rohie. "A Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering Research and Science 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejers.2020.5.7.1976.

Full text
Abstract:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and reco
APA, Harvard, Vancouver, ISO, and other styles
33

Kakar, Abdul Sattar, and Muhammad Sadiq Rohie. "Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering and Technology Research 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejeng.2020.5.7.1976.

Full text
Abstract:
Cache memory plays a central role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache. Browsers' cache has a significant role according to less bandwidth use, response time and traffic load as well as beneficial if the internet connection is slow. Due to the space limitations, modern browsers companies attempt to use a method to store a great number of web objects and to advance the effectiveness of web browsers. Many scientists have been working to discover and reco
APA, Harvard, Vancouver, ISO, and other styles
34

Tissue, Brian M., Ching-Wan Yip, and Yue-Ling Wong. "NCSA Mosaic: An Internet and Hypermedia Browser." Journal of Chemical Education 72, no. 6 (1995): A116. http://dx.doi.org/10.1021/ed072pa116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Mu'Minin, Mu'Minin, and Nuril Anwar. "Live Data Forensic Artefak Internet Browser (Studi Kasus Google Chrome, Mozilla Firefox, Opera Mode Incognito)." Buletin Sistem Informasi dan Teknologi Islam 1, no. 3 (2020): 130–38. http://dx.doi.org/10.33096/busiti.v1i3.834.

Full text
Abstract:
Browser merupakan program aplikasi perangkat lunak yang digunakan untuk mengakses internet baik dari perangkat desktop maupun mobile. Browser tersebut digunakan untuk mencari segala macam informasi yang tersedia di dunia internet. Browser terdapat fitur mode incognito yang digunakan dalam menjelajah informasi di internet. Fitur ini diklaim tidak menyimpan data penelusuran pribadi, seperti riwayat penelusuran, cookies, cache, dan kata sandi, di penyimpanan browser. Namun browser mode incognito dapat meninggalkan barang bukti digital di sistem. Hal ini menjadi tantangan bagi forensik investigato
APA, Harvard, Vancouver, ISO, and other styles
36

Deepika and Ashutosh Dixit Dr. "CAPTURING USER BROWSING BEHAVIOUR INDICATORS." Electrical & Computer Engineering: An International Journal (ECIJ) 4, no. 2 (2015): 23–30. https://doi.org/10.5281/zenodo.3541673.

Full text
Abstract:
The information available on internet is in unsystematic manner. With the help of available browsers, user can get their data but that too are not relevant. To get relevant results, users&rsquo; interest should be considered. But no available browser is considering users&rsquo; interest in browsing the internet. There are some indicators that are used to indicate the users&rsquo; browsing behaviour over the internet. These indicators are called as implicit indicators and explicit indicators. In this paper, a tool is proposed that will store the users&rsquo; browsing behaviour indicators. These
APA, Harvard, Vancouver, ISO, and other styles
37

Sidiq, Muhammad Fajar, and Muhammad Nur Faiz. "Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 1 (2019): 67. http://dx.doi.org/10.26418/jp.v5i1.31430.

Full text
Abstract:
Perkembangan penggunaan internet yang semakin banyak setiap tahunnya mengakibatkan penggunaan web browser juga meningkat. Hal ini berdampak pada kejahatan dengan menggunakan web browser juga meningkat seperti penyalahgunaan email, hoax, hate speech, penipuan dan lainnya. Penelitian ini menunjukkan pentingnya mengenali aktivitas penggunaan web browser dari sisi korban dan pelaku. Penggunaan web browser ini akan menentukan pola atau alur kejahatan pada suatu insiden kejahatan. Hal ini akan membantu penyidik dalam menganalisis bukti digital secara cepat dan dapat mengungkap jenis kejahatan yang t
APA, Harvard, Vancouver, ISO, and other styles
38

Dr.A.Shaji, George, and Dr.T.Baskar. "Indian Own Browser: A Step Towards Digital Sovereignty." Partners Universal International Innovation Journal (PUIIJ) 03, no. 02 (2025): 1–17. https://doi.org/10.5281/zenodo.15159008.

Full text
Abstract:
India's ambitious initiative to develop an indigenous web browser marks a significant milestone in the country's pursuit of digital sovereignty, cybersecurity, and self-reliance. This groundbreaking project aims to create a home-grown web browser that caters to the unique needs of Indian users, while also promoting the country's technological independence. The motivation behind this initiative stems from the growing concerns over data privacy, linguistic inclusivity, and the dominance of foreign platforms in the Indian digital landscape. The methodology employed in the development of the India
APA, Harvard, Vancouver, ISO, and other styles
39

Özgür, Önday. "Battle of Desktop Web Browsers: The Case of Internet Explorer and Mozilla Firefox." Journal of Scientific Reports 2, no. 1 (2020): 43–57. https://doi.org/10.5281/zenodo.3731964.

Full text
Abstract:
Day by day correspondence is encouraged by computerized advancements through Web locales and web based life, and got to by means of PCs and cell phones (Meeker, Devitt, and Wu, 2009). The PC has changed the manner in which we live, work and play&quot; (Lunenfeld, 2011, p. 143). Specialized gadgets are driving the advancement of innovation guidelines that are ground-breaking for purchasers, yet much progressively incredible and productive for the organizations that control them. A fight proceeds for authority over the manner in which we get to data online by means of Web programs on PCs and cel
APA, Harvard, Vancouver, ISO, and other styles
40

Ramadhan, Rizki Fauzian, and Achmad Fauzan. "Pembatasan Internet Berbasis Ekstensi Web pada Chrome Browser." Proceedings Series on Physical & Formal Sciences 6 (October 13, 2023): 192–99. http://dx.doi.org/10.30595/pspfs.v6i.869.

Full text
Abstract:
Internet memberikan banyak manfaat untuk manusia, seperti membantu mengakses konten pendidikan, hiburan dan informas lainnya. Namun terdapat juga dampak negatif seperti akses konten pornografi, perjudian, dan sebagainya. Salah satu cara mengatasi dampak negatif internet adalah dengan menerapkan pembatasan konten, seperti penggunaan firewall, VPN, dan program “Internet Positif” pemerintah. Dengan perkembangan teknologi mesin peramban internet, dikembangkan ekstensi web khususnya untuk mesin peramban Google Chrome yang dapat melakukan pembatasan domain dan konten secara fleksibel. Jenis konten d
APA, Harvard, Vancouver, ISO, and other styles
41

Loo, Alfred. "Internet surfing for kindergarten children." Gifted Education International 28, no. 2 (2012): 176–84. http://dx.doi.org/10.1177/0261429411435007.

Full text
Abstract:
The Internet is an effective learning tool for gifted children because it allows them to independently select the areas in which they have talent. The Internet also enables children to discover and maximize their potential. However, younger children might not have a large enough vocabulary to surf the Internet, even if they are gifted. For example, children who are creatively gifted might not have exceptional reading ability. To solve this problem, a special web browser was used to generate human speech according to the words that appeared on the web pages displayed. Experiments involving abou
APA, Harvard, Vancouver, ISO, and other styles
42

Mahlous, Ahmed, and Houssam Mahlous. "Private Browsing Forensic Analysis: A Case Study of Privacy Preservation in the Brave Browser." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 294–306. http://dx.doi.org/10.22266/ijies2020.1231.26.

Full text
Abstract:
The Internet and its users are in continual growth. With it grows the number of organized crimes on the Internet and the potential for individuals to carry out illegal activities. These criminals have gained more awareness of private browsing facilities, and many have found a haven in privacy designed browsers that cover up their tracks and shield their nefarious actions. The development of these privacy features has proven to be a challenge for digital forensic investigators. They strive to perform a thorough analysis of web browsers to collect artefacts relating to illegal activity to be pre
APA, Harvard, Vancouver, ISO, and other styles
43

Aji Pamungkas, Stefanus Lintang Timur. "Comparison of Three Browser Performances." SISFORMA 1, no. 2 (2014): 9. http://dx.doi.org/10.24167/sisforma.v1i2.398.

Full text
Abstract:
In this era of globalization and modernity, it is important to obtain information, and the role of Internet in providing information is indispensable. The existence of the World Wide Web technology makes it easy for people to surf various websites. The elements on the website are the code javascript, css, and HTML5
APA, Harvard, Vancouver, ISO, and other styles
44

Bergasa-Suso, J., D. A. Sanders, and G. E. Tewkesbury. "Intelligent Browser-Based Systems to Assist Internet Users." IEEE Transactions on Education 48, no. 4 (2005): 580–85. http://dx.doi.org/10.1109/te.2005.854570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Purkait, Swapan. "Examining the effectiveness of phishing filters against DNS based phishing attacks." Information & Computer Security 23, no. 3 (2015): 333–46. http://dx.doi.org/10.1108/ics-02-2013-0009.

Full text
Abstract:
Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally
APA, Harvard, Vancouver, ISO, and other styles
46

Mutaqin Subekti, Zaenal, Kikim Mukiman, Ahmad Fikri Adluwal Fadhil, and Muhammad Asyrofi. "Penerapan Limit Akses Browsing Internet pada saat Jam Kerja di PT XYZ." Jurnal Teknologi Terpadu 7, no. 1 (2021): 31–38. http://dx.doi.org/10.54914/jtt.v7i1.342.

Full text
Abstract:
Salah satu perusahaan engineering yang terletak di kawasan Cikarang, mempunyai aturan bahwa setiap karyawan tidak boleh akses internet melalui browser pada jam kerja, yaitu jam 08.00 pagi sampai jam 12.00 dan jam 13.00 sampai jam 17.00 pada saat jam istirahat yaitu jam 12.00 – 13.00 karyawan dapat mengakses internet melalui browser, dengan menerapkan kebijakan perusahaan untuk diimplementasikan pada firewall router, sehingga kebijakan perusahaan tersebut dapat diikuti oleh semua karyawan dengan baik. Tahapan penelitian dimulai dari Analisa untuk menganalisa kebutuhan software dan hardware, ked
APA, Harvard, Vancouver, ISO, and other styles
47

Zhou, Jian-Zhong (Joe). "The Internet, the World Wide Web, Library Web Browsers, and Library Web Servers." Information Technology and Libraries 19, no. 1 (2017): 50–52. http://dx.doi.org/10.6017/ital.v19i1.10075.

Full text
Abstract:
This article first examines the difference between two very familiar and sometimes synonymous terms, the Internet and the Web. The article then explains the relationship between the Web's protocol HTTP and other high-level Internet protocols, such as Telnet and FTP, as well as provides a brief history of Web development. Next, the article analyzes the mechanism in which a Web browser (client) "talks" to a Web server on the Internet. Finally, the article studies the market growth for Web browsers and Web servers between 1993 and 1999. Two statistical sources were used in the Web market analysis
APA, Harvard, Vancouver, ISO, and other styles
48

Faisol, Ahmad, and Febi Rahmadianto. "REALTIME NOTIFICATION PADA APLIKASI BERBASIS WEB MENGGUNAKAN FIREBASE CLOUD MESSAGING (FCM)." Jurnal Mnemonic 1, no. 2 (2019): 14–17. http://dx.doi.org/10.36040/mnemonic.v1i2.32.

Full text
Abstract:
Perkembangan teknologi pada aplikasi berbasis web saat ini dituntut untuk selalu memberikan pelayanan secara realtime. Salah satu bentuk layanan web yang lagi tren adalah pengiriman notifikasi kepada client. Dengan fitur tersebut, sebuah aplikasi berbasis web dapat mengirimkan pemberitahuan tentang berita-berita terbaru atau informasi penting kepada pelanggan melalui media browser. Firebase Cloud Messaging (FCM) merupakan salah satu bentuk layanan yang disediakan oleh Google untuk mengirimkan sebuah pesan atau pemberitahuan kepada pelanggan melalui media browser maupun smartphone. Pada penelit
APA, Harvard, Vancouver, ISO, and other styles
49

He, Lu, and Yan Mei Zhang. "Database Dynamic Programming Based on B/S." Applied Mechanics and Materials 310 (February 2013): 601–4. http://dx.doi.org/10.4028/www.scientific.net/amm.310.601.

Full text
Abstract:
Short for Browser/Server, B/S is designed to centralize the core part of system functions on the server side, when users just need to install a browser on the client side, such as Internet Explorer, Firefox. Thus, the browser can be used for data exchange through the Web Server anywhere, as long as the computer accesses to the Internet. As a result, there is no doubt that the development of B/S structure system has become main-stream as the Internet has developed rapidly today [1]. As we all know, it is increasingly challenging that customers are having more and more requirements of details an
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Yibing, and Haoyu Qin. "Research and analysis of browser games." Applied and Computational Engineering 17, no. 1 (2023): 45–52. http://dx.doi.org/10.54254/2755-2721/17/20230910.

Full text
Abstract:
In 1987, the first video game was published. People entered a new world to explore gaming. After ten years, browser games were invented. In order to deeply discuss browser games future, this article summarizes the features and current situation of browser games. This article analyzes the strengthens of browser games in three aspects, which are convenient setup for players to start the game, social interaction for players to interact with other people, and free-to-play experience provided for players. The analysis of browser games weaknesses is included in this article as well, which were the p
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!