29 results on '"Favicon"'
Search Results
2. Developing a Webpage Phishing Attack Detection Tool
- Author
-
Almutairi, Abdulrahman, Alshoshan, Abdullah I., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2022
- Full Text
- View/download PDF
3. Web Programming
- Author
-
Putrady, Ecky and Putrady, Ecky
- Published
- 2018
- Full Text
- View/download PDF
4. Building a Landing Page with Skeleton
- Author
-
Shenoy, Aravind, Prabhu, Anirudh, Shenoy, Aravind, and Prabhu, Anirudh
- Published
- 2018
- Full Text
- View/download PDF
5. Socket.IO and Express.js
- Author
-
Mardan, Azat and Mardan, Azat
- Published
- 2014
- Full Text
- View/download PDF
6. Leverage Website Favicon to Detect Phishing Websites
- Author
-
Jeffrey Soon-Fatt Choo, Kelvin S. C. Yong, Kang Leng Chiew, and San Nah Sze
- Subjects
Leverage (finance) ,Article Subject ,Computer Networks and Communications ,Computer science ,Phishing attack ,020206 networking & telecommunications ,02 engineering and technology ,Phishing ,World Wide Web ,Cybercrime ,Domain name ,Favicon ,lcsh:Technology (General) ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:T1-995 ,020201 artificial intelligence & image processing ,False positive rate ,Internet users ,lcsh:Science (General) ,lcsh:Q1-390 ,Information Systems - Abstract
Phishing attack is a cybercrime that can lead to severe financial losses for Internet users and entrepreneurs. Typically, phishers are fond of using fuzzy techniques during the creation of a website. They confuse the victim by imitating the appearance and content of a legitimate website. In addition, many websites are vulnerable to phishing attacks, including financial institutions, social networks, e-commerce, and airline websites. This paper is an extension of our previous work that leverages the favicon with Google image search to reveal the identity of a website. Our identity retrieval technique involves an effective mathematical model that can be used to assist in retrieving the right identity from the many entries of the search results. In this paper, we introduced an enhanced version of the favicon-based phishing attack detection with the introduction of the Domain Name Amplification feature and incorporation of addition features. Additional features are very useful when the website being examined does not have a favicon. We have collected a total of 5,000 phishing websites from PhishTank and 5,000 legitimate websites from Alexa to verify the effectiveness of the proposed method. From the experimental results, we achieved a 96.93% true positive rate with only a 4.13% false positive rate.
- Published
- 2018
7. Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks
- Author
-
Thar Baker, Dhiya Al-Jumeily, Mohamed Alloghani, Abir Hussain, Jamila Mustafina, and Ahmed J. Aljaaf
- Subjects
Artificial neural network ,Computer science ,business.industry ,Network monitoring ,Computer security ,computer.software_genre ,Machine learning ,Perceptron ,Phishing ,URL shortening ,Detect and avoid ,Favicon ,Seven Basic Tools of Quality ,Artificial intelligence ,business ,computer - Abstract
Of the many challenges that continue to make detection of cyber-attack detection elusive, lack of training data remains the biggest one. Even though organizations and business turn to known network monitoring tools such as Wireshark, millions of people are still vulnerable because of lack of information pertaining to website behaviors and features that can amount to an attack. In fact, most of the attacks do not occur because of threat actors’ resort to complex coding and evasion techniques but because victims lack the basic tools to detect and avoid the attacks. Despite these challenges, machine learning is proving to revolutionize the understanding of the nature of cyber-attacks, and this study implemented machine learning techniques to Phishing Website data with the objective of comparing five algorithms and providing insight that the general public can use to avoid phishing pitfalls. The findings of the study suggest that Neural Network is the best performing algorithm and the model suggest that inclusion of an IP address in the domain name, longer URL, use of URL shortening services, inclusion of “@” symbol in the URL, inclusion of “−” symbol in the URL, use of non-trusted SSL certificates with expiry duration less than 6 months, domains registered for less than one year, and favicon redirecting from other URLs as the leading features of phishing websites. Neural Network is based on multi-layer perceptron and is the basis of intelligence so that in future, phishing detection will be automated and rendered an artificial intelligence task.
- Published
- 2019
8. Logo Design Analysis by Ranking
- Author
-
Daiki Suehiro, Seiichi Uchida, and Takuro Karamatsu
- Subjects
Focus (computing) ,Computer science ,business.industry ,Logo ,02 engineering and technology ,010501 environmental sciences ,Graphic design ,Logos Bible Software ,Atmosphere (architecture and spatial design) ,01 natural sciences ,Data science ,Ranking (information retrieval) ,Favicon ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,0105 earth and related environmental sciences - Abstract
In this paper, we analyze logo designs by using machine learning, as a promising trial of graphic design analysis. Specifically, we will focus on favicon images, which are tiny logos used as company icons on web browsers, and analyze them to understand their trends in individual industry classes. For example, if we can catch the subtle trends in favicons of financial companies, they will suggest to us how professional designers express the atmosphere of financial companies graphically. For the purpose, we will use top-rank learning, which is one of the recent machine learning methods for ranking and very suitable for revealing the subtle trends in graphic designs.
- Published
- 2019
9. Comparison of Mobile Web Browsers for Smartphones
- Author
-
Junyoung Ahn, Robert W. Proctor, and Kyungdoh Kim
- Subjects
Multimedia ,Computer Networks and Communications ,Computer science ,05 social sciences ,Navigation bar ,Mobile Web ,02 engineering and technology ,computer.software_genre ,Education ,World Wide Web ,Web Accessibility Initiative ,Favicon ,020204 information systems ,Web design ,Web page ,0202 electrical engineering, electronic engineering, information engineering ,Mobile search ,0501 psychology and cognitive sciences ,Web navigation ,computer ,050107 human factors ,Information Systems - Abstract
Previous studies on mobile Web browsers have focused on phone features and technical performance, but not on the user interface. In this study, we compared three mobile Web browsers in the iPhone and ultimately proposed recommendations for the design of mobile Web browsers for smartphones. To develop such recommendations, we redefined the user interface (UI) components of mobile Web browsers from previous studies to conform to smartphones and compared the Chrome, Safari, and Opera Mini-browsers. To do this, we conducted experiments on usability tests with several dependent variables, including usefulness, perceived time reduction, minimal action, usability, ease to memorize, learnability, fun, and satisfaction. Finally, we developed several recommendations, based on the experimental results and participant interviews, which will fulfill user needs for the interface design of mobile Web browsers for smartphones. Multi-windows need to be implemented in a 3D environment. Developers should consider UI...
- Published
- 2016
10. Building a Landing Page with Skeleton
- Author
-
Anirudh Prabhu and Aravind Shenoy
- Subjects
Engineering drawing ,Landing page ,Computer science ,Favicon ,Web page ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Grid system ,Skeleton (category theory) ,HTML element ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
Skeleton is an intuitive framework for lightweight projects. It is extremely lightweight with a handful of HTML elements and was developed with a mobile-first philosophy. In this chapter, you will learn how to install Skeleton. You will also learn about its grid system and attributes, and then you’ll build a landing web page with Skeleton.
- Published
- 2018
11. Analysis of the Pattern for Icon Selection and Relation to Positive/Negative Actions in Desktop Applications
- Author
-
Simona Ramanauskaitė, Eglė Radvilė, Živilė Bičiūnaitė, and Antanas Čenys
- Subjects
Relation (database) ,Computer science ,Shell (computing) ,Desktop metaphor ,Favicon ,Human–computer interaction ,General Earth and Planetary Sciences ,Icon ,User interface ,computer ,Virtual desktop ,Selection (genetic algorithm) ,General Environmental Science ,computer.programming_language - Published
- 2015
12. An Enhanced Blacklist Method to Detect Phishing Websites
- Author
-
Alwyn R. Pais and Routhu Srinivasa Rao
- Subjects
Information retrieval ,Computer science ,Fingerprint (computing) ,Whitelist ,02 engineering and technology ,Hyperlink ,Phishing ,Blacklist ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Favicon ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,020201 artificial intelligence & image processing ,Document Object Model - Abstract
Existing anti-phishing techniques like whitelist or blacklist detect the phishing sites based on the database of approved and unapproved URLs. Most of the current phishing attacks are actually replicas or variations of other attacks in the database. In this paper, we propose an enhanced blacklist method which uses key discriminate features extracted from the source code of the website for the detection of phishing websites. The main focus of our work is to detect the phishing sites which are replicas of existing websites with manipulated content. Each phishing website is identified with a unique fingerprint which is generated from the set of proposed features. We used Simhash algorithm to generate fingerprint for each website. The features used for calculating fingerprint are filenames of the request URLs (js, img, CSS, favicon), pathnames of request URLs (CSS, scripts, img, anchor links), and attribute values of tags (H1, H2, div, body, form). Our experimentation detected 84.36% of phishing sites as replicas of other phishing websites with manipulated content while maintaining zero false positive rate. The proposed method is similar to that of traditional blacklist with an advantage that it can detect replicated and manipulated phishing sites efficiently.
- Published
- 2017
13. Combating phishing attacks via brand identity and authorization features
- Author
-
Yan-Ming Zhang, Xiaodong Lee, and Guanggang Geng
- Subjects
Spoofing attack ,Notice ,Computer Networks and Communications ,business.industry ,Computer science ,Domain Name System ,Internet privacy ,Authorization ,Logo ,Phishing ,Favicon ,The Internet ,business ,Information Systems - Abstract
Phishing, also called brand spoofing, has become the most troubling scam on the Internet, which seriously threatens the Web security. The essence of phish is that "robbers" use false sites, which look like a trustworthy brand site, where favicon, logo and copyright notice are important brand identities. We analyzed 78-day phishing data of PhishTank and Anti-Phishing Working Group APWG. The statistics show that more than 98.93% phishing sites contain at least one brand entity-favicon, logo or copyright notice. Indeed, only a few lowest-quality phishing campaigns do not use such brand elements. Obviously, brand entities are powerful weapons of phishers to trick users. By analyzing the characteristics of brand entities in phishing sites, several brand identity features are extracted. However, only brand entities do not consider whether the Web page with brand entities belongs to the corresponding brand or has an authorization to use the brand entities. To solve this problem, redirection, incoming links and Domain Name System DNS information-based brand authorization features are further extracted to discriminate the sites with branding rights from phishing sites. Based on extracted features, statistical anti-phishing classification models are trained. We collected a diverse spectrum of corpora containing 3863 phishing cases from PhishTank and APWG, and 17571 legitimate samples from DMOZ, Google and DNS resolution log. Experimental evaluations show that the model achieves 98.8% true positive rate and 0.09% false positive rate, which demonstrates the competitive performances of extracted features for statistical anti-phishing in practice. Copyright © 2014 John Wiley & Sons, Ltd.
- Published
- 2014
14. Page File-Oriented Web Application Design
- Author
-
Jian Zhang and Huanmei Wu
- Subjects
Same-origin policy ,medicine.medical_specialty ,Computer science ,05 social sciences ,050801 communication & media studies ,Static web page ,Dynamic web page ,Page view ,World Wide Web ,0508 media and communications ,Favicon ,0502 economics and business ,Web design ,Web page ,medicine ,050211 marketing ,Web modeling - Abstract
This paper provides a web application design method, page file-oriented web application design with relevant concept and the corresponding definitions for the variety of web application development, technology and software engineering. We provide the page file flow chart which describes the relationships and parameters passing between every page of the website. It provides a standard technical specification for the website designing and development. This paper also gives mathematical definition of page file flow chart that can be further realizing the software package or plug-in to provide the support for visual website development and testing.
- Published
- 2016
15. Los navegadores de la web 2.0: Firefox, Opera y Explorer
- Author
-
Lluís Codina and Ricard Monistrol
- Subjects
Multimedia ,Computer science ,Navigation bar ,Quirks mode ,Library and Information Sciences ,Content Security Policy ,Web Slice ,computer.software_genre ,Browser security ,World Wide Web ,WYCIWYG ,Favicon ,Web page ,computer ,Information Systems - Abstract
Web 2.0 and browsers are two very closely connected concepts. The reason is that browsers are the user agents that are needed to make navigating web 2.0 a reality. Within a very short span of time, new versions have been issued by the top three web browsers: Explorer, Firefox and Opera. In this article we examine and compare the new capabilities and functions of these three browsers in terms of the new web.
- Published
- 2007
16. Website Creation Software and Web Browsers
- Author
-
Phillip Whitt
- Subjects
World Wide Web ,Web analytics ,Web Accessibility Initiative ,Computer science ,Favicon ,business.industry ,Web page ,Navigation bar ,Social media ,Content Security Policy ,business ,Browser security - Abstract
This chapter introduces several no-cost tools for creating websites, blogging, and managing social media in order to maximize business exposure.
- Published
- 2015
17. A Geographic 3D Visualization and Browser of the World Wide Web
- Author
-
Rydgren, Lars-Olof and Rydgren, Lars-Olof
- Abstract
Internet är ett stort globalt nätverk som fortsätter växa i komplexitet med nya tekniker och protokoll som utvidgar dess användbarhet och sättet vi sprider information. Trender, nyheter, videor och annan information sprider sig snabbt över världen vilket gör Internet till ett fantastiskt redskap för de användare som prenumererar på rätt informationsströmmar eller nyheter. Webläsare är en nödvändighet för att struktuera den information vi hittat och för att surfning av webben ska bli bekväm. De områden som en traditionell webläsare saknar är främst en vägledning in i den digitala världen för en icke-erfaren användare. Det är svårt att få en uppfattning av Internets storlek, djup och var man är respektive alla andra användare. Internet har en stor kultur som kan anses transparent i första ögonblicket då man öppnar en webläsare för första gången. Traditionella webläsare saknar en vägvisande introduktion till Internets kultur och dess populära hemsidor. Om man visualiserar alla Internet's publika hemsidor i en 3-dimensionell värld så ger det möjlighet till att se dess storlek och utforska det på ett alternativt sätt. Vilket därmed också simplifierar dess komplexitet. Användaren kan då få en överblick av webben där dess aktivitet och kultur kan visas i formen av en mer spelliknande miljö. Denna avhandling handlar om att visualisera en delmängd av Internet's publika hemsidor som byggnadsobjekt i en värld där användaren interaktivt kan besöka varje hemsida i världen, där höjden av varje byggnadsobjekt återspeglar hemsidans popularitet. Ett bot-program med flera trådar har används för att lagra relationerna mellan hemsidorna vi hittat för att senare använda denna data i en så kallad force-directed algorithm. Denna algoritm kommer skapa attraktions och repulsions krafter mellan noder som representerar hemsidorna, där nodernas position ändras iterativt av dessa krafter i mån om att få dem geografiskt placerade. Krafterna mellan noderna bestäms av hur mycket PageRank en sida h, Internet is a vast digital network. Evergrowing in its complexity with frequent newly developed protocols extending the technology and changing the way we communicate and share information over the world. Trends, news, videos and other information spread quickly over the world, making web browsers an incredible tool for users who listen to the right feeds or news networks. Web browsers are a necessity for structuring our obtained information and are needed for convenient surfing of the web. But for the non-experienced user it may not be completely self-explanatory what the Internet is, where to go or how far its borders stretches, the depth isn't shown and have to be individually explored mainly through the use of search engines. The culture of Internet can seem transparent the first time you open the traditional web browser. Traditional web browsers lack an introductional guidance into the culture and to the popular sites. By visualizing public websites of the Internet as objects in a 3-dimensional world, the user will be able to see the boundaries of the web and explore it in a new fashion where the complexity of its structure is greatly reduced. The user will get an overview of the web in which activity and the culture can be shown in a game-alike environment. This thesis will be about visualizing a crawled subset of websites as a city of buildings, where each building represents a website that the user can visit inside the world, the building's height reflecting its website's popularity. A multi-threaded crawler is used to find and store the relations between the set of websites, namely how many outgoing and which outgoing links each site has. This data in turn will be used by a force-directed algorithm that will position these buildings relatively geographical by attaching imaginary strings between them that either repulse or attract websites with high respective low relational attraction. The attractional forces being defined by the calculated PageRank that ar
- Published
- 2015
18. Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website
- Author
-
Sze San Nah, Chiew Kang Leng, and Jeffrey Choo Soon Fatt
- Subjects
World Wide Web ,business.industry ,Computer science ,Latent semantic analysis ,Favicon ,Internet privacy ,Web page ,Reservation ,business ,Phishing ,Tourism ,Spoofed URL ,Visualization - Abstract
Phishing attacks involve the use of fuzzy techniques to create polymorphic phishing web pages to give the impression of legitimate websites. Many websites are subject to the threat of phishing, including financial, social networks, tourism, e-commerce etc. For example, phishers are particularly fond of travel-related services by imitating as trip consultant, airline reservation, hotel booking etc. However, the targeted legitimate websites still maintain the webpage appearance visually similar to the original. In this paper, we propose an approach which is based on the website favicon to find the identity of a website and use it to evaluate the genuineness of a website. This approach utilizes Google search-by-image API to return the search results pages. Then, we perform latent semantic analysis based on the search results pages. We collected 1,000 webpages to verify the effectiveness of this approach. The results show that our proposed method achieved 97.2% true positive with only 5.4% false positive.
- Published
- 2014
19. Socket.IO and Express.js
- Author
-
Azat Mardan
- Subjects
WebSocket ,Computer science ,Favicon ,Operating system ,computer.software_genre ,computer - Abstract
Socket.IO ( http://socket.io ) is a library that provides the capability to establish two-way communication between a client and the server in real time. This two-way communication is driven by the WebSocket technology.
- Published
- 2014
20. Development of the display formatting system from computer browsers to smartphone browsers: a case study of tourism website
- Author
-
Suchada Ratanakongnate and Phongsak Thatanam
- Subjects
World Wide Web ,Disk formatting ,Favicon ,Computer science ,Navigation bar ,Browser security ,Tourism - Published
- 2014
21. Comparative study of modern web browsers based on their performance and evolution
- Author
-
Vishal Anand and Deepanker Saxena
- Subjects
World Wide Web ,WYCIWYG ,Web Accessibility Initiative ,Multimedia ,Favicon ,Computer science ,Web page ,Navigation bar ,Quirks mode ,computer.software_genre ,computer ,Address bar ,Browser security - Abstract
Internet is the most revolutionary invention of 20th century. It has contracted the world and made the lives of the people lucid and simple. Web browsers act as medium to access internet features and help us browse different websites for our daily purpose making most difficult tasks easier. In this paper, we will talk about advancement in field of web browser. Since it plays major role in field of internet, we will catch the significance and utility of popular browsers like Google Chrome, Internet Explorer, Mozilla Firefox, Opera, etc. performance evaluation will be done based on their performance in different user's environment. We have seen lot of variations in the versions of these web browsers from past decade and we will also focus on the variation and evolution of browsers with the alteration.
- Published
- 2013
22. Document icon bar for the support of authoring, learning and navigation on the Web: Usability issues
- Author
-
Claude Ghaoui
- Subjects
Multimedia ,Relation (database) ,Computer Networks and Communications ,Bar (music) ,business.industry ,Computer science ,Usability ,USable ,computer.software_genre ,Computer Science Applications ,Advice (programming) ,World Wide Web ,Hardware and Architecture ,Favicon ,The Internet ,Icon ,business ,computer ,computer.programming_language - Abstract
Currently, no approved standards exist to aid authors in designing usable multimedia documents. Sites exist on the Internet offering style guides which are often very detailed. In most cases, only the most determined of authors will wade their way through such sites for advice. Icon bars contribute a great deal to resolving usability problems. Standard Internet browsers have an icon bar, which this paper refers to as a ‘Site level icon bar’, due to the functions of its buttons—they control functions of the browser which do not belong to the viewed document but rather to the Internet sites visited. This paper argues that major usability problems (i.e. in relation to authoring and navigation of Web documents) can be overcome by introducing another type of icon bars, i.e. a ‘Document level icon bar’—for which the functions are directly relevant to the document being viewed, rather than to the site visited as in the first type. A programmable document level icon bar would enable the authoring of a range of standard navigational buttons which in turn would increase the speed of document transmission. Furthermore, widespread adoption of this icon bar will reduce the total burden on the bandwidth of the Internet as a whole. A prototype tool, called WebCheck, has been developed with a programmable document level icon bar to demonstrate this idea.
- Published
- 2000
23. Favicon - a clue to phishing sites detection
- Author
-
Guanggang Geng, Xiaodong Lee, Shian-Shyong Tseng, and Wei Wang
- Subjects
Web search query ,Computer science ,business.industry ,Phishing ,law.invention ,World Wide Web ,PageRank ,law ,Favicon ,Web page ,Identity (object-oriented programming) ,The Internet ,business ,Spoofed URL - Abstract
Phishing is a type of scam designed to steal user's identity. Typically, anti-phishing methods either use blacklists or recognize the phishing pattern with statistical learning. This paper focuses on a tiny but powerful visual element-favicon, which is widely used by phishers but ignored by anti-phishing researchers. Indeed, only some lowest-quality phishing campaigns do not use such favicons. By analyzing the characteristic of favicon in phishing sites, an alternative phishing detection method is proposed. Favicon detection and recognition locates the suspicious brand sites, including legitimate and fake brands sites, and then PageRank and DNS filtering algorithm discriminates the sites with branding rights from fake brands sites. To validate the effectiveness of the proposed method, we carried out two different experiments. One is collecting a diverse spectrum of corpora containing 3642 phishing cases containing favicons from PhishTank, and 19585 legitimate Web pages from DMOZ and Google; experimental evaluations on the data set show that the proposed method achieved over 99.50% TPR and 0.15% FPR. The other is validating the method in the real Web query environment; a total of 517 unique phishing URLs were found and reported to the Anti-Phishing Alliance of China in a month. The experimental results demonstrate the competitive performances of favicon detection and recognition method for anti-phishing in practice.
- Published
- 2013
24. Web browser artefacts in private and portable modes: a forensic investigation
- Author
-
Cassandra Flowers, Ali Mansour, and Haider Al-Khateeb
- Subjects
File system ,Computer Networks and Communications ,Computer science ,business.industry ,Navigation bar ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Browser security ,World Wide Web ,Web Accessibility Initiative ,Favicon ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Session (computer science) ,Safety, Risk, Reliability and Quality ,business ,Law ,computer ,Volatile memory - Abstract
Web browsers are essential tools for accessing the internet. Extra complexities are added to forensic investigations when recovering browsing artefacts as portable and private browsing are now common and available in popular web browsers. Browsers claim that whilst operating in private mode, no data is stored on the system. This paper investigates whether the claims of web browsers discretion are true by analysing the remnants of browsing left by the latest versions of Internet Explorer, Chrome, Firefox, and Opera when used in a private browsing session, as a portable browser, and when the former is running in private mode. Some of our key findings show how forensic analysis of the file system recovers evidence from IE while running in private mode whereas other browsers seem to maintain better user privacy. We analyse volatile memory and demonstrate how physical memory by means of dump files, hibernate and page files are the key areas where evidence from all browsers will still be recoverable despite their mode or location they run from.
- Published
- 2016
25. NoTabNab: Protection against the 'tabnabbing attack'
- Author
-
Kemal Bicakci and Seckin Anil Unlu
- Subjects
Engineering ,business.industry ,Network security ,media_common.quotation_subject ,Internet privacy ,Deception ,Internet security ,Computer security ,computer.software_genre ,Phishing ,Pre-play attack ,Favicon ,business ,computer ,Tabnabbing ,Spoofed URL ,media_common - Abstract
In recent years phishing attacks have become one of the most important problems of online security. Aza Raskin, the creative lead of Mozilla Firefox team, proposed a new type of phishing attack, “tabnabbing attack” as he names it. The attack is different from classical phishing attacks; while classical attacks rely on deception of users with a similar URL and/or content in appearance to the original site, this attack uses our memory weakness and false perception that browser tabs are immutable i.e., do not change while inactive. We develop a Firefox add-on to protect users against this attack. Our method is based on the fact that a phishing web site should change its layout radically to look like the original site. This add-on watches the open tabs and indicates whether one changes its layout, favicon and/or title to become like another site.
- Published
- 2010
26. Improving Document Icon to Re-find Efficiently What You Need
- Author
-
Hongan Wang, Feng Tian, Chang-Zhi Deng, Guozhong Dai, and Mingjun Zhou
- Subjects
Multiple document interface ,Information retrieval ,Computer science ,business.industry ,User requirements document ,World Wide Web ,Annotation ,Design Document Listing ,Favicon ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Icon ,business ,computer ,Graphical user interface ,computer.programming_language - Abstract
It is common that documents are represented by document icon in graphical user interfaces. The document icon facilitates user to retrieve documents, but it is difficult to distinguish the document from a collection of documents that user have accessed to. Our paper presents a document icon on which the users can add some subjective values and mark. Then we describe a system ex-explorer that users can browser and search the extent document icon. We found that it is easy to re-find the document on which users added some annotation or mark by themselves.
- Published
- 2007
27. Favicon seeded web surfing
- Author
-
G. Scott Owen and Feng Liu
- Subjects
Multimedia ,Computer science ,Favicon ,Computer graphics (images) ,computer.software_genre ,computer - Published
- 2006
28. Support Tool Using Positions of Contents for Voice/Gaze-controlled Browsers
- Author
-
Masahide Yuasa and Minoru Ohyama
- Subjects
World Wide Web ,Computer science ,Favicon ,Web page ,Navigation bar ,Window (computing) ,computer.software_genre ,Gaze ,Proxy server ,computer - Abstract
In this paper, we propose a support tool termed Calamari to improve voice/gaze-controlled browsers by using information about the position of contents. It can quickly determine the positions of links, images, and tables in a Web page. Positions in a browser window are important for voice/gaze-controlled browsers to deal with user commands associated with directions, for example, select "upper one" and "left figure." By using positional information, developers can effectively improve these browsers to use commands along with directions. The proposed tool is implemented in a proxy server; hence, it does not depend on browsers and operating systems. Although it rewrites an HTML document, it does not change the Web page design. We describe two applications using the tool and demonstrate that it is useful for developers to enhance the voice/gaze-controlled browsers.
- Published
- 2005
29. Google VP Calls For Comments On Favicon Design.
- Author
-
Paul Glazowski
- Abstract
Sometimes small changes can grow into big issues. Especially if those changes are made by an online corporation with global spread and hundreds of millions of regular consumers or users. Enter, the Google favicon. Surely you’ve noticed the company’s shift from a big, brawny capital ‘G’ to a more reserved, accentuated and scripted lowercase ‘g’. How does it suit you? Well? Does it not appeal? Does the move not concern you in the least? Wherever you sit, Google’s Marissa Meyer, vice president of Search Products and User Experience, as well as Michael Lopez, an individual listed as Web Designer for the company, have offered up brief peek at what the company’s options were in choosing its primary bookmark-friendly logo, so as to better explain to any and all curious folk the why behind their selection. Meyer and Lopez make sure to note that the pick now visible to those who utilize some of Google’s services is not set in stone, and that the company is open to feedback from users. (Comments may offered at this page). Which, in my view, is a good thing. Because I’m just not feeling the option being tested publicly as of late. Not to get too tangential about art of symbolism or anything, the newest favicon belies the company’s character of dominance in the search market. The big ‘G’ was able to portray strength. The one to take its place…doesn’t. Perhaps “little g†could be given to Google Reader, which might better connote the elegance of Mountain View’s primarily text-based RSS aggregator. Google Search, however, should really maintain its capital(ist) dimensions. If the company saw the previous, gloss-less icon (which apparently stood tenured for some 8.5 years, a seeming eternity in Internet years), as needing a refresh, its proposed blue, bubble-ized ‘G’ logo - seen in the fourth row of the menu of options shown below - would suffice. More so than its smaller alternative, anyhow. What do you think? ---Related Articles at Mashable! - The Social Networking Blog:20 Icon & Graphics GeneratorsGoogle Reader Gets New FeaturesWill The Real YouTube India Finally Launch Next Week?Google To Launch Google WikiBebo Logo EvolutionGoogle Maps Hangs Up on Click-to-CallGoogle Checkout Trends Knows Your Shopping Habits [ABSTRACT FROM PUBLISHER]
- Published
- 2008
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.