Explore chapters and articles related to this topic
A Deep-dive on Machine Learning for Cyber Security Use Cases
Published in Brij B. Gupta, Michael Sheng, Machine Learning for Computer and Cyber Security, 2019
R. Vinayakumar, K.P. Soman, Prabaharan Poornachandran, Vijay Krishna Menon
A uniform resource locator (URL) is a division of Uniform Resource Identifier (URI) that is used to identify the location of the resources and retrieve them from internet. This directs the user to a particular web page on a website. A URL is composed of two parts. The first part is the protocol, for example, Hypertext Transfer Protocol (HTTP), Hyper Text Transfer Protocol Secure (HTTPS) and the second part is the location of resources via domain name or internet protocol (IP) address. Both are separated by a colon and followed by two forward slashes. Most of the time a user by oneself is not known whether the URL belongs to either benign or malicious category. Thus unsuspecting users visits the websites through the URL presented in e-mail, web search results and others. Once the URL is compromised, an attacker imposes an attack. These compromised URLs are typically termed as malicious URLs. As a security mechanism, finding the nature of a particular URL will alleviate most of the attacks occurring frequently.
IoT and edge computing in the construction site
Published in Pieter Pauwels, Kris McGlinn, Buildings and Semantics, 2023
A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. A URI can be further classified as a locator (URL), a name (URN), or both. A more commonly known version of a URI is a Uniform Resource Locator (URL), which in addition to identifying a resource, provides a means of locating the resource by describing its primary access mechanism (e.g., its network “location”). A ucode is an identifier to be stored in many types of tags (RFID tags, optical code, infrared markers, and even sound sources), specified by the Ubiquitous ID Centre. Its use is to identify objects and places where existing standards do not fit the application needs. Applications that use ucode take advantage of the Internet extensively.
Hypertext Transfer Protocol
Published in Giovanni Bartolomeo, Tatiana Kováčiková, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web, 2016
Giovanni Bartolomeo, Tatiana Kováčiková
However, the two schemas have been conceptually unified under the notion of Uniform Resource Identifier (URI; RFC 2396 and RFC 3986 [Berners-Lee, Fielding, and Masinter 1998, 2005]), and in practice it is common to use the term HTTP URI to actually refer to a HTTP URL. A URI is composed of at least two components, a scheme and an authority. The scheme component is case insensitive; however, it is common convention to use lowercase letters. The authority component is scheme dependent and may be case insensitive (noticeably in HTTP, where the authority is a domain name).
RESTsec: a low-code platform for generating secure by design enterprise services
Published in Enterprise Information Systems, 2018
Christoforos Zolotas, Kyriakos C. Chatzidimitriou, Andreas L. Symeonidis
Resource: Resources are the building blocks of the generated RESTful Services as dictated by the Resource-Oriented Architecture. Each resource has a unique URI in order to be identified and accessed. A resource may be related to none or more resources, and relations are specified as hypermedia links for implementing Hypermedia As The Engine Of Application State (HATEOAS33).