Journal articles on the topic 'Web browser'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Web browser.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Riggs, Colby. "New Web Browser Applications." Library Hi Tech News 21, no. 4 (2004): 11–12. http://dx.doi.org/10.1108/07419050410545870.
Full textKohana, Masaki, Shinji Sakamoto, and Shusuke Okamoto. "Web Browser Network Based on a BA Model for a Web-Based Virtual World." Future Internet 11, no. 7 (2019): 147. http://dx.doi.org/10.3390/fi11070147.
Full textRochmadi, Tri. "LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR." Indonesian Journal of Business Intelligence (IJUBI) 1, no. 1 (2019): 32. http://dx.doi.org/10.21927/ijubi.v1i1.878.
Full textKarthikeyan Dhanasekaran. "InclusiveWeb : A Smart Browser Approach to Enhancing Web Accessibility for Users with Diverse Disabilities." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 82–89. http://dx.doi.org/10.32628/cseit24106156.
Full textChen, Bo, and Gavriel Salvendy. "Design and Validation of a User-Centered Web Browser." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 42, no. 3 (1998): 369–71. http://dx.doi.org/10.1177/154193129804200340.
Full textAndriamilanto, Nampoina, Tristan Allard, Gaëtan Le Guelvouit, and Alexandre Garel. "A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication." ACM Transactions on the Web 16, no. 1 (2022): 1–62. http://dx.doi.org/10.1145/3478026.
Full textSangani, K. "Web everywhere [Web browser]." Engineering & Technology 5, no. 16 (2010): 26–29. http://dx.doi.org/10.1049/et.2010.1604.
Full textBhadarage, Shubham. "Browser Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31830.
Full textSingh, Shailendra, Prashant Bhardwaj, and Mohammed Abdul Qadeer. "Neo Browser: Java Based Web Browser for Mobile Phones." International Journal of Engineering and Technology 4, no. 6 (2012): 817–20. http://dx.doi.org/10.7763/ijet.2012.v4.491.
Full textZadereyko, Оlexander, Olena Trofymenko, Nataliia Loginova, Yuliia Loboda, and Yuliia Prokop. "ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 199–212. http://dx.doi.org/10.28925/2663-4023.2024.23.199212.
Full textQueiroz, Jordan S., and Eduardo L. Feitosa. "A Web Browser Fingerprinting Method Based on the Web Audio API." Computer Journal 62, no. 8 (2019): 1106–20. http://dx.doi.org/10.1093/comjnl/bxy146.
Full textChyzhik, Eduard, and Jakub Smołka. "Analysis of user identification methods in web browsers." Journal of Computer Sciences Institute 34 (March 30, 2025): 60–67. https://doi.org/10.35784/jcsi.6701.
Full textSahinurHossen, Mohammad, Rakibul Islam, Md Nasef Ur Rahman Chowdhury, Ahshanul Haque, and Qudrat E. Alahy Ratul. "Malware Detection in Web Browser Plugins Using API Calls with Permissions." International Journal of Advanced Networking and Applications 14, no. 06 (2023): 5672–77. http://dx.doi.org/10.35444/ijana.2023.14603.
Full textŞah, Melike, and Wendy Hall. "Dynamic Linking and Personalization on the Web using Linked Open Data." International Journal on Semantic Web and Information Systems 9, no. 2 (2013): 31–61. http://dx.doi.org/10.4018/jswis.2013040102.
Full text정동훈 and Choi, Junho. "Mobile Web Browser Testing - Full Browser vs. WAP Browser -." Journal of Digital Design 10, no. 1 (2010): 287–95. http://dx.doi.org/10.17280/jdd.2010.10.1.028.
Full textKurako, E. A., R. E. Asratian, and V. L. Orlov. "Service Browser in Linux Environment." Programmnaya Ingeneria 15, no. 5 (2024): 219–28. http://dx.doi.org/10.17587/prin.15.219-228.
Full textBaran, Erkan, Huseyin Çakır, and Çelebi Uluyol. "Web browsers forensic analysis reviewWeb tarayıcılarda adli analiz incelemesi." International Journal of Human Sciences 12, no. 2 (2015): 757. http://dx.doi.org/10.14687/ijhs.v12i2.3244.
Full textCassel, Darion, Su-Chin Lin, Alessio Buraggina, et al. "OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 227–52. http://dx.doi.org/10.2478/popets-2022-0012.
Full textSy, Erik, Christian Burkert, Hannes Federrath, and Mathias Fischer. "A QUIC Look at Web Tracking." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 255–66. http://dx.doi.org/10.2478/popets-2019-0046.
Full textBensch, Michael, Ahmed A. Karim, Jürgen Mellinger, et al. "Nessi: An EEG-Controlled Web Browser for Severely Paralyzed Patients." Computational Intelligence and Neuroscience 2007 (2007): 1–5. http://dx.doi.org/10.1155/2007/71863.
Full textKakar, Abdul Sattar, and Muhammad Sadiq Rohie. "A Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering Research and Science 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejers.2020.5.7.1976.
Full textKakar, Abdul Sattar, and Muhammad Sadiq Rohie. "Review of Probabilistic Techniques Used for Web browsers’ Caching." European Journal of Engineering and Technology Research 5, no. 7 (2020): 773–80. http://dx.doi.org/10.24018/ejeng.2020.5.7.1976.
Full textLee, Vicki Wei Qi, Shih Yin Ooi, Ying Han Pang, and Kiu Nai Pau. "A Study on Browser Fingerprinting Uniqueness Using Clustering Methods and Entropy Validation." International Journal on Advanced Science, Engineering and Information Technology 14, no. 6 (2024): 1991–2000. https://doi.org/10.18517/ijaseit.14.6.16396.
Full textHasan, Fayyad-Kazan, Kassem-Moussa Sondos, Hejase Hussin J, and Hejase Ale J. "Forensic analysis of private browsing mechanisms: Tracing internet activities." Journal of Forensic Science and Research 5, no. 1 (2021): 012–19. http://dx.doi.org/10.29328/journal.jfsr.1001022.
Full textFajar, Abdullah, Setiadi Yazid, ., and . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, no. 4.44 (2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.
Full textNiakanlahiji, Amirreza, and Jafar Haadi Jafarian. "WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense." Security and Communication Networks 2019 (May 14, 2019): 1–13. http://dx.doi.org/10.1155/2019/2156906.
Full textEl-Tayeb, Mahmoud, Ahmed Taha, and Zaki Taha. "Streamed Video Reconstruction for Firefox Browser Forensics." Ingénierie des systèmes d information 26, no. 4 (2021): 337–44. http://dx.doi.org/10.18280/isi.260401.
Full textDharani, Kumar.C, and G.Vadivu. "Visualizing Chrome Browser History using Exploratory." International Journal of Trend in Scientific Research and Development 1, no. 5 (2017): 692–700. https://doi.org/10.31142/ijtsrd2313.
Full textBrindha.S, Brindha S. "Developing Web Browser-Jan." IOSR Journal of Computer Engineering 10, no. 2 (2013): 75–78. http://dx.doi.org/10.9790/0661-01027578.
Full textGifford, Atticus, Benjamin J. Menasha, and David Finkel. "The visible Web browser." ACM SIGCSE Bulletin 31, no. 3 (1999): 209. http://dx.doi.org/10.1145/384267.305959.
Full textGangele, Sharad, Sunil Patil, Diwakar Shukla, and Rahul Singhai. "A Novel Way for Area Computation of Browser Sharing Phenomena through Implementation of Simpson's 1/3 Method." COMPUSOFT: An International Journal of Advanced Computer Technology 06, no. 05 (2017): 2347–54. https://doi.org/10.5281/zenodo.14803288.
Full textAbdiati, Agustia Dwi, Santoso Setiawan, and Hendra Supendar. "Pemilihan Web Browser Pada Mobile Menggunakan Metode Analytical Hierachy Process." Jurnal Infortech 3, no. 1 (2021): 26–32. http://dx.doi.org/10.31294/infortech.v3i1.10298.
Full textOktavianita, Annisa Dwi, Hendra Dea Arifin, Muhammad Dzulfikar Fauzi, and Aulia Faqih Rifa'i. "An Analysis of Memory Usage in Web Browser Software." IJID (International Journal on Informatics for Development) 5, no. 2 (2016): 21. http://dx.doi.org/10.14421/ijid.2016.05204.
Full textZhou, Chijin, Quan Zhang, Lihua Guo, et al. "Towards Better Semantics Exploration for Browser Fuzzing." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 604–31. http://dx.doi.org/10.1145/3622819.
Full textWillian, Massami Watanabe, Christian Paes Fagner, and Silva Daiany. "Towards Cross-browser Incompatibilities Detection: Asystematic Literature Review." International Journal of Software Engineering & Applications (IJSEA) 10, no. 6 (2019): 17–32. https://doi.org/10.5281/zenodo.3587377.
Full textLosada, Pérez José, Santiago Juan Raposo, Bermúdez Carlos Alberto Pan, Castelao Paula Montoto, and Díaz Manuel Álvarez. "A Custom Browser Architecture to Execute Web Navigation Sequences." Lecture Notes in Computer Science 9419, no. II (2015): 149–63. https://doi.org/10.1007/978-3-319-26187-4_11.
Full textKletz, Sabrina, Marco Bertini, and Mathias Lux. "Open source column: Deep learning in the browser." ACM SIGMultimedia Records 11, no. 1 (2019): 1. http://dx.doi.org/10.1145/3458462.3458466.
Full textGannouni, Sofien, Nourah Alangari, Hassan Mathkour, Hatim Aboalsamh, and Kais Belwafi. "BCWB." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 55–73. http://dx.doi.org/10.4018/ijswis.2017040104.
Full textLiu, Wen Tao. "Research on Offline Storage of Web Page." Applied Mechanics and Materials 518 (February 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.518.305.
Full textRay, Loye Lynn. "Countering Cross-Site Scripting in Web-based Applications." International Journal of Strategic Information Technology and Applications 6, no. 1 (2015): 57–68. http://dx.doi.org/10.4018/ijsita.2015010105.
Full textPaes, Fagner Christian, and Willian Massami Watanabe. "Detecção Automática de Incompatibilidades Cross-Browser utilizando Redes Neurais Artificiais." Journal on Advances in Theoretical and Applied Informatics 2, no. 2 (2016): 55. http://dx.doi.org/10.26729/jadi.v2i2.2109.
Full textZalipynis, Ramon Antonio Rodriges, and Nikita Terlych. "WebArrayDB." Proceedings of the VLDB Endowment 15, no. 12 (2022): 3622–25. http://dx.doi.org/10.14778/3554821.3554859.
Full textShukla, Abhishek. "Comparative Analysis of Webkit and Non-Webkit Based Browsers and their Future." Journal of Mathematical & Computer Applications 2, no. 4 (2023): 1–3. http://dx.doi.org/10.47363/jmca/2023(2)130.
Full textShoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2023): 1–11. http://dx.doi.org/10.48001/joitml.2023.111-11.
Full textShoikhedbrod, Michael. "Internet of Things and JavaScript." Journal of IoT and Machine Learning 1, no. 1 (2024): 1–8. http://dx.doi.org/10.48001/joitml.2024.111-8.
Full textLeith, Douglas J. "Web Browser Privacy: What Do Browsers Say When They Phone Home?" IEEE Access 9 (2021): 41615–27. http://dx.doi.org/10.1109/access.2021.3065243.
Full textDr.A.Shaji, George, and Dr.T.Baskar. "Indian Own Browser: A Step Towards Digital Sovereignty." Partners Universal International Innovation Journal (PUIIJ) 03, no. 02 (2025): 1–17. https://doi.org/10.5281/zenodo.15159008.
Full textJung, Won-Chi, and Namje Park. "A Safe Web in Network Separation Environment." Journal of Computational and Theoretical Nanoscience 17, no. 7 (2020): 3243–49. http://dx.doi.org/10.1166/jctn.2020.9168.
Full textVatsal, Prince. "Real-Time Human Pose Estimation Using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34377.
Full textRahmatulloh, Alam, Andi Nur Rachman, and Fahmi Anwar. "Implementasi Web Push Notification pada Sistem Informasi Manajemen Arsip Menggunakan PUSHJS." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 3 (2019): 327. http://dx.doi.org/10.25126/jtiik.201963936.
Full text