Cyber threat intelligence-based malicious URL detection model using ensemble learning
Web applications have become ubiquitous for many business sectors due to their platform
independence and low operation cost. Billions of users are visiting these applications to …
independence and low operation cost. Billions of users are visiting these applications to …
Developing a framework for detecting phishing URLs using machine learning
NT Lam - International Journal of Computer Science & Network …, 2023 - koreascience.kr
The attack technique targeting end-users through phishing URLs is very dangerous
nowadays. With this technique, attackers could steal user data or take control of the system …
nowadays. With this technique, attackers could steal user data or take control of the system …
Qsecr: Secure qr code scanner according to a novel malicious url detection framework
AS Rafsanjani, NB Kamaruddin, HM Rusli… - IEEE …, 2023 - ieeexplore.ieee.org
Malicious Uniform Resource Locators (URLs) are the major issue posed by cybersecurity
threats. Cyberattackers spread malicious URLs to carry out attacks such as phishing and …
threats. Cyberattackers spread malicious URLs to carry out attacks such as phishing and …
BERT-Based Approaches to Identifying Malicious URLs
MY Su, KL Su - Sensors, 2023 - mdpi.com
Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in
phishing attempts aimed at stealing sensitive information or distributing malware. Therefore …
phishing attempts aimed at stealing sensitive information or distributing malware. Therefore …
A unified learning approach for malicious domain name detection
AA Wagan, Q Li, Z Zaland, S Marjan, DK Bozdar… - Axioms, 2023 - mdpi.com
The DNS firewall plays an important role in network security. It is based on a list of known
malicious domain names, and, based on these lists, the firewall blocks communication with …
malicious domain names, and, based on these lists, the firewall blocks communication with …
Cascaded capsule twin attentional dilated convolutional network for malicious URL detection
VK Chauhan, A Kumar - Expert Systems with Applications, 2025 - Elsevier
Malware is one of the most popular cyber-attacks, and it is becoming more common on the
network every day. In contrast to benign transmission, which typically exhibits symmetrical …
network every day. In contrast to benign transmission, which typically exhibits symmetrical …
Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation
AS Rafsanjani, NB Kamaruddin, M Behjati… - IEEE …, 2024 - ieeexplore.ieee.org
Malicious Uniform Resource Locators (URLs) pose a significant cybersecurity threat by
carrying out attacks such as phishing and malware propagation. Conventional malicious …
carrying out attacks such as phishing and malware propagation. Conventional malicious …
Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection
Web applications have proliferated across various business sectors, serving as essential
tools for billions of users in their daily lives activities. However, many of these applications …
tools for billions of users in their daily lives activities. However, many of these applications …
[PDF][PDF] Malicious url classification using artificial fish swarm optimization and deep learning
M Hilal, AHA Hashim, HG Mohamed… - … , Materials & Continua, 2023 - irep.iium.edu.my
Cybersecurity-related solutions have become familiar since it ensures security and privacy
against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be …
against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be …
Novel Security Metrics for Identifying Risky Unified Resource Locators (URLs)
M Deypir, T Zoughi - Iranian Journal of Science and Technology …, 2024 - Springer
Attackers perform malicious activities by sending URL s to victims via e-mail, SMS, social
network messages, and other means. Recently, intruders have been generating malicious …
network messages, and other means. Recently, intruders have been generating malicious …