1 - 4 of 4 articles
Web scraping techniques based on XPath enable users to consistently extract information of interest from webpages that do not provide a structured interface. However, XPath-based extraction is likely to fail when encountering page variants, resulting in a high cost of repair. Countermeasures...
Attacks against web servers are one of the most serious threats in security fields. Attackers are able to make the computer systems more vulnerable. Analysing the web logs is one of the most effective methods to identify malicious behaviours. In this study, we consider the analysis of HTTP...
In past years, different machine learning algorithms and web spam features have been created to recognise the spam. The key part of progression of machine learning (ML) depends on the features being utilised. If we have features which correlate with each other then it is easy for ML to learn and...
E-commerce offers an online shopping environment in which manufacturers, businesses, and consumers participate. The past-customer emotion outlined in their reviews plays an important role in not only the purchasing decisions of potential consumers, but also in manufacturers' production plans and...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.