Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
Title | Jonathan |
Description | Jonathan Peck Ph.D. student, Ghent University jonathan.peck@ugent.be I am a PhD student at Ghent University , affiliated with the Department of Applied Ma |
Keywords | N/A |
WebSite | |
Host IP | 172.104.230.193 |
Location | - |
Euro€1,247,585
Dernière mise à jour: 2022-10-23
pecky.be a un classement mondial Semrush de 8,483,835. pecky.be a une valeur estimée à € 1,247,585, sur la base de ses revenus publicitaires estimés. pecky.be reçoit environ 143,953 visiteurs uniques chaque jour. Son serveur Web est situé au -, avec l'adresse IP 172.104.230.193.Selon SiteAdvisor, pecky.be est sûr à visiter. |
Valeur d'achat/vente | Euro€1,247,585 |
Revenus publicitaires quotidiens | Euro€1,152 |
Revenus publicitaires mensuels | Euro€34,549 |
Revenus publicitaires annuels | Euro€414,583 |
Visiteurs uniques quotidiens | 9,597 |
Remarque: Toutes les valeurs de trafic et de revenus sont des estimations. |
Host | Type | TTL | Data |
pecky.be. | A | 3599 | IP: 172.104.230.193 |
pecky.be. | AAAA | 3599 | IPV6: 2a01:7e01::f03c:92ff:feeb:225f |
pecky.be. | NS | 14400 | NS Record: ns02.one.com. |
pecky.be. | NS | 14400 | NS Record: ns01.one.com. |
pecky.be. | MX | 10800 | MX Record: 10 mx4.pub.mailpod11-cph3.one.com. |
pecky.be. | MX | 10800 | MX Record: 10 mx3.pub.mailpod11-cph3.one.com. |
pecky.be. | MX | 10800 | MX Record: 10 mx2.pub.mailpod11-cph3.one.com. |
pecky.be. | MX | 10800 | MX Record: 10 mx1.pub.mailpod11-cph3.one.com. |
Jonathan Peck Ph.D. student, Ghent University jonathan.peck@ugent.be I am a PhD student at Ghent University , affiliated with the Department of Applied Mathematics, Computer Science and Statistics (TWIST) as well as the Data Mining and Modeling for Biomedicine group at the VIB Inflammation Research Center . I am also a teaching assistant for the Artificial Intelligence course offered by Ghent University at the Faculty of Sciences. My main focus of research is the study of adversarial examples . Broadly speaking, adversarial examples are input samples deliberately crafted by a malicious adversary in order to obtain certain specific predictions from a targeted machine learning model. The intent here is usually to cause some form of harm, such as bypassing automated content filters, malware protections or biometric security systems. In my work, I try to devise countermeasures against this form of exploitation. Aside from research into adversarial examples, I am also interested in issues |
HTTP/1.1 301 Moved Permanently Server: nginx/1.18.0 (Ubuntu) Date: Sun, 23 Oct 2022 08:48:56 GMT Content-Type: text/html Content-Length: 178 Connection: keep-alive Location: https://pecky.be/ HTTP/1.1 200 OK Server: nginx/1.18.0 (Ubuntu) Date: Sun, 23 Oct 2022 08:48:57 GMT Content-Type: text/html Content-Length: 32385 Last-Modified: Fri, 06 Aug 2021 12:16:15 GMT Connection: keep-alive ETag: "610d280f-7e81" Accept-Ranges: bytes |
Domain: pecky.be Status: NOT AVAILABLE Registered: Tue Jun 23 2020 Not shown, please visit www.dnsbelgium.be for webbased whois. Organisation: One.com A/S Language: en Phone: +45.46907100 Name: One.com A/S Website: http://www.one.com ns01.one.com ns02.one.com keyTag:41398 flags:KSK protocol:3 algorithm:ECDSAP256SHA256 pubKey:CZlqhmA/XWR441Q1SBDhCW+0UgMhzqhqCAoZBd1Pmly07Ya9MZe/KmA+pHuaKErY7yIZjrpjjS0Qwmi7CL1oYQ== Please visit www.dnsbelgium.be for more info. |