Journal articles on the topic 'Internet Browser'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet Browser.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR." Indonesian Journal of Business Intelligence (IJUBI) 1, no. 1 (2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.
Full textMendel, Alan. "PDM and the Internet." Mechanical Engineering 121, no. 09 (1999): 60–63. http://dx.doi.org/10.1115/1.1999-sep-3.
Full textGangele, Sharad, Sunil Patil, Diwakar Shukla, and Rahul Singhai. "A Novel Way for Area Computation of Browser Sharing Phenomena through Implementation of Simpson's 1/3 Method." COMPUSOFT: An International Journal of Advanced Computer Technology 06, no. 05 (2017): 2347–54. https://doi.org/10.5281/zenodo.14803288.
Full textHasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J, and Hejase Ale J. "Forensic analysis of private browsing mechanisms: Tracing internet activities." Journal of Forensic Science and Research 5, no. 1 (2021): 012–19. http://dx.doi.org/10.29328/journal.jfsr.1001022.
Full textShoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2023): 1–11. http://dx.doi.org/10.48001/joitml.2023.111-11.
Full textShoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2024): 1–8. http://dx.doi.org/10.48001/joitml.2024.111-8.
Full textRicart, Glenn. "The Mosaic Internet Browser." Computers in Physics 8, no. 3 (1994): 249. http://dx.doi.org/10.1063/1.4823294.
Full textBhadarage, Shubham. "Browser Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31830.
Full textSahinurHossen, Mohammad, Rakibul Islam, Md Nasef Ur Rahman Chowdhury, Ahshanul Haque, and Qudrat E. Alahy Ratul. "Malware Detection in Web Browser Plugins Using API Calls with Permissions." International Journal of Advanced Networking and Applications 14, no. 06 (2023): 5672–77. http://dx.doi.org/10.35444/ijana.2023.14603.
Full textTamary, Jonathan, and Dror G. Feitelson. "The rise of Chrome." PeerJ Computer Science 1 (October 28, 2015): e28. http://dx.doi.org/10.7717/peerj-cs.28.
Full textFajar, Abdullah, Setiadi Yazid, ., and . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, no. 4.44 (2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.
Full textZadereyko, Оlexander, Olena Trofymenko, Nataliia Loginova, Yuliia Loboda, and Yuliia Prokop. "ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 199–212. http://dx.doi.org/10.28925/2663-4023.2024.23.199212.
Full textFreyberger, Michael, Warren He, Devdatta Akhawe, Michelle L. Mazurek, and Prateek Mittal. "Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers." Proceedings on Privacy Enhancing Technologies 2018, no. 2 (2018): 47–63. http://dx.doi.org/10.1515/popets-2018-0012.
Full textMustika, Wida Prima, Mardian Mardian, and Rinawati Rinawati. "Analitycal Hierarchy Process Untuk Menganalisa Faktor Pemilihan Web Browser Pada Desktop." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 1 (2018): 83. http://dx.doi.org/10.30645/j-sakti.v2i1.57.
Full textEl-Tayeb, Mahmoud, Ahmed Taha, and Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics." Ingénierie des systèmes d information 26, no. 4 (2021): 337–44. http://dx.doi.org/10.18280/isi.260401.
Full textChalyi, Oleksii, Kęstutis Driaunys, and Vytautas Rudžionis. "Assessing Browser Security: A Detailed Study Based on CVE Metrics." Future Internet 17, no. 3 (2025): 104. https://doi.org/10.3390/fi17030104.
Full textBaran, Erkan, Huseyin Çakır, and Çelebi Uluyol. "Web browsers forensic analysis reviewWeb tarayıcılarda adli analiz incelemesi." International Journal of Human Sciences 12, no. 2 (2015): 757. http://dx.doi.org/10.14687/ijhs.v12i2.3244.
Full textSunitharam, Dr C., Sayimpu Vinay, and Sannapaneni Anand. "Preserving Privacy and Security in Browser Case Study of Mantis Browser." International Journal of Soft Computing and Engineering 12, no. 1 (2022): 1–4. http://dx.doi.org/10.35940/ijsce.a3544.0312122.
Full textDr., C. Sunitharam, Vinay Sayimpu, and Anand Sannapaneni. "Preserving Privacy and Security in Browser Case Study of Mantis Browser." International Journal of Soft Computing and Engineering (IJSCE) 12, no. 1 (2022): 1–4. https://doi.org/10.35940/ijsce.A3544.0312122.
Full textAbdiati, Agustia Dwi, Santoso Setiawan, and Hendra Supendar. "Pemilihan Web Browser Pada Mobile Menggunakan Metode Analytical Hierachy Process." Jurnal Infortech 3, no. 1 (2021): 26–32. http://dx.doi.org/10.31294/infortech.v3i1.10298.
Full textBensch, Michael, Ahmed A. Karim, Jürgen Mellinger, et al. "Nessi: An EEG-Controlled Web Browser for Severely Paralyzed Patients." Computational Intelligence and Neuroscience 2007 (2007): 1–5. http://dx.doi.org/10.1155/2007/71863.
Full textMichael, Adam. "Caveat browser warning on Internet IPOs." Nature Biotechnology 16, no. 8 (1998): 716. http://dx.doi.org/10.1038/nbt0898-716a.
Full textShukla, Abhishek. "Comparative Analysis of Webkit and Non-Webkit Based Browsers and their Future." Journal of Mathematical & Computer Applications 2, no. 4 (2023): 1–3. http://dx.doi.org/10.47363/jmca/2023(2)130.
Full textPramono, Bagus, and Indrastanti Ratna Widiasari. "Membangun Server NVR berbasis Open-Source menggunakan ShinobiCE (Studi Kasus DISKOMINFO Boyolali)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (2023): 306–12. http://dx.doi.org/10.35870/jtik.v7i2.778.
Full textEdan, Naktal, and Enas Y. Abdullah. "Design and implementation of a novel secured and wide WebRTC signalling mechanism for multimedia over internet." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5430. http://dx.doi.org/10.11591/ijece.v10i5.pp5430-5435.
Full textNaktal, Edan, and Y. Abdullah Enas. "Design and implementation of a novel secured and wide WebRTC signalling mechanism for multimedia over internet." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 5430–35. https://doi.org/10.11591/ijece.v10i5.pp5430-5435.
Full textRoberts, Caroline, Jessica M. E. Herzing, Marc Asensio Manjon, Philip Abbet, and Daniel Gatica-Perez. "Response Burden and Dropout in a Probability-Based Online Panel Study – A Comparison between an App and Browser-Based Design." Journal of Official Statistics 38, no. 4 (2022): 987–1017. http://dx.doi.org/10.2478/jos-2022-0043.
Full textDougan, Timothy, and Kevin Curran. "Man in the Browser Attacks." International Journal of Ambient Computing and Intelligence 4, no. 1 (2012): 29–39. http://dx.doi.org/10.4018/jaci.2012010103.
Full textFabisiak, Tomasz, and Arkadiusz Danilecki. "Browser-based Harnessing of Voluntary Computational Power." Foundations of Computing and Decision Sciences 42, no. 1 (2017): 3–42. http://dx.doi.org/10.1515/fcds-2017-0001.
Full textKozlovskis, Dāvis. "A COMPARATIVE STUDY OF THE SPEED AND SECURITY OF INTERNET BROWSERS: GOOGLE CHROME, MOZILLA FIREFOX, MICROSOFT EDGE, BRAVE AND OPERA." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 28 (September 10, 2024): 59–63. http://dx.doi.org/10.17770/het2024.28.8260.
Full textSy, Erik, Christian Burkert, Hannes Federrath, and Mathias Fischer. "A QUIC Look at Web Tracking." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 255–66. http://dx.doi.org/10.2478/popets-2019-0046.
Full textKakar, Abdul Sattar, and Muhammad Sadiq Rohie. "A Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering Research and Science 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejers.2020.5.7.1976.
Full textKakar, Abdul Sattar, and Muhammad Sadiq Rohie. "Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering and Technology Research 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejeng.2020.5.7.1976.
Full textTissue, Brian M., Ching-Wan Yip, and Yue-Ling Wong. "NCSA Mosaic: An Internet and Hypermedia Browser." Journal of Chemical Education 72, no. 6 (1995): A116. http://dx.doi.org/10.1021/ed072pa116.
Full textMu'Minin, Mu'Minin, and Nuril Anwar. "Live Data Forensic Artefak Internet Browser (Studi Kasus Google Chrome, Mozilla Firefox, Opera Mode Incognito)." Buletin Sistem Informasi dan Teknologi Islam 1, no. 3 (2020): 130–38. http://dx.doi.org/10.33096/busiti.v1i3.834.
Full textDeepika and Ashutosh Dixit Dr. "CAPTURING USER BROWSING BEHAVIOUR INDICATORS." Electrical & Computer Engineering: An International Journal (ECIJ) 4, no. 2 (2015): 23–30. https://doi.org/10.5281/zenodo.3541673.
Full textSidiq, Muhammad Fajar, and Muhammad Nur Faiz. "Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 1 (2019): 67. http://dx.doi.org/10.26418/jp.v5i1.31430.
Full textDr.A.Shaji, George, and Dr.T.Baskar. "Indian Own Browser: A Step Towards Digital Sovereignty." Partners Universal International Innovation Journal (PUIIJ) 03, no. 02 (2025): 1–17. https://doi.org/10.5281/zenodo.15159008.
Full textÖzgür, Önday. "Battle of Desktop Web Browsers: The Case of Internet Explorer and Mozilla Firefox." Journal of Scientific Reports 2, no. 1 (2020): 43–57. https://doi.org/10.5281/zenodo.3731964.
Full textRamadhan, Rizki Fauzian, and Achmad Fauzan. "Pembatasan Internet Berbasis Ekstensi Web pada Chrome Browser." Proceedings Series on Physical & Formal Sciences 6 (October 13, 2023): 192–99. http://dx.doi.org/10.30595/pspfs.v6i.869.
Full textLoo, Alfred. "Internet surfing for kindergarten children." Gifted Education International 28, no. 2 (2012): 176–84. http://dx.doi.org/10.1177/0261429411435007.
Full textMahlous, Ahmed, and Houssam Mahlous. "Private Browsing Forensic Analysis: A Case Study of Privacy Preservation in the Brave Browser." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 294–306. http://dx.doi.org/10.22266/ijies2020.1231.26.
Full textAji Pamungkas, Stefanus Lintang Timur. "Comparison of Three Browser Performances." SISFORMA 1, no. 2 (2014): 9. http://dx.doi.org/10.24167/sisforma.v1i2.398.
Full textBergasa-Suso, J., D. A. Sanders, and G. E. Tewkesbury. "Intelligent Browser-Based Systems to Assist Internet Users." IEEE Transactions on Education 48, no. 4 (2005): 580–85. http://dx.doi.org/10.1109/te.2005.854570.
Full textPurkait, Swapan. "Examining the effectiveness of phishing filters against DNS based phishing attacks." Information & Computer Security 23, no. 3 (2015): 333–46. http://dx.doi.org/10.1108/ics-02-2013-0009.
Full textMutaqin Subekti, Zaenal, Kikim Mukiman, Ahmad Fikri Adluwal Fadhil, and Muhammad Asyrofi. "Penerapan Limit Akses Browsing Internet pada saat Jam Kerja di PT XYZ." Jurnal Teknologi Terpadu 7, no. 1 (2021): 31–38. http://dx.doi.org/10.54914/jtt.v7i1.342.
Full textZhou, Jian-Zhong (Joe). "The Internet, the World Wide Web, Library Web Browsers, and Library Web Servers." Information Technology and Libraries 19, no. 1 (2017): 50–52. http://dx.doi.org/10.6017/ital.v19i1.10075.
Full textFaisol, Ahmad, and Febi Rahmadianto. "REALTIME NOTIFICATION PADA APLIKASI BERBASIS WEB MENGGUNAKAN FIREBASE CLOUD MESSAGING (FCM)." Jurnal Mnemonic 1, no. 2 (2019): 14–17. http://dx.doi.org/10.36040/mnemonic.v1i2.32.
Full textHe, Lu, and Yan Mei Zhang. "Database Dynamic Programming Based on B/S." Applied Mechanics and Materials 310 (February 2013): 601–4. http://dx.doi.org/10.4028/www.scientific.net/amm.310.601.
Full textChen, Yibing, and Haoyu Qin. "Research and analysis of browser games." Applied and Computational Engineering 17, no. 1 (2023): 45–52. http://dx.doi.org/10.54254/2755-2721/17/20230910.
Full text