Perception layer security in Internet of Things
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …
largely attracted both the industry and the academia. Life without the IoT is entirely …
[HTML][HTML] A predictive model for phishing detection
AA Orunsolu, AS Sodiya, AT Akinwale - Journal of King Saud University …, 2022 - Elsevier
Nowadays, many anti-phishing systems are being developed to identify phishing contents in
online communication systems. Despite the availability of myriads anti-phishing systems …
online communication systems. Despite the availability of myriads anti-phishing systems …
[HTML][HTML] PhiDMA–A phishing detection model with multi-filter approach
G Sonowal, KS Kuppusamy - Journal of King Saud University-Computer …, 2020 - Elsevier
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal
sensitive information from victims by providing a fake site which looks like the visual clone of …
sensitive information from victims by providing a fake site which looks like the visual clone of …
Phishing detection: A recent intelligent machine learning comparison based on models content and features
N Abdelhamid, F Thabtah… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
In the last decade, numerous fake websites have been developed on the World Wide Web to
mimic trusted websites, with the aim of stealing financial assets from users and …
mimic trusted websites, with the aim of stealing financial assets from users and …
A phishing detection system based on machine learning
CY Wu, CC Kuo, CS Yang - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
As the Internet has become an essential part of human beings' lives, a growing number of
people are enjoying the convenience brought by the Internet, while more are attacks coming …
people are enjoying the convenience brought by the Internet, while more are attacks coming …
PhishStack: evaluation of stacked generalization in phishing URLs detection
SSMM Rahman, T Islam, MI Jabiullah - Procedia Computer Science, 2020 - Elsevier
Stacked Generalization has been assessed and evaluated in the field of Phishing URLs
detection. This field has become egregious area of information security. Recently, different …
detection. This field has become egregious area of information security. Recently, different …
Malicious web domain identification using online credibility and performance data by considering the class imbalance issue
Purpose Malicious web domain identification is of significant importance to the security
protection of internet users. With online credibility and performance data, the purpose of this …
protection of internet users. With online credibility and performance data, the purpose of this …
A lightweight and proactive rule-based incremental construction approach to detect phishing scam
M SatheeshKumar, KG Srinivasagan… - Information Technology …, 2022 - Springer
The development of digitization over the globe has made digital security inescapable. As
every single article on this planet is being digitalized quickly, it is more important to protect …
every single article on this planet is being digitalized quickly, it is more important to protect …
Performance assessment of multiple machine learning classifiers for detecting the phishing URLs
In the field of information security, phishing URLs detection and prevention has recently
become egregious. For detecting, phishing attacks several anti-phishing systems have …
become egregious. For detecting, phishing attacks several anti-phishing systems have …
[PDF][PDF] Enhancing Detection of Malicious URLs Using Boosting and Lexical Features.
M Atrees, A Ahmad, F Alghanim - Intelligent Automation & Soft …, 2022 - cdn.techscience.cn
A malicious URL is a link that is created to spread spams, phishing, malware, ransomware,
spyware, etc. A user may download malware that can adversely affect the computer by …
spyware, etc. A user may download malware that can adversely affect the computer by …