Detecting malicious URLs using machine learning techniques: review and research directions

M Aljabri, HS Altamimi, SA Albelali, M Al-Harbi… - IEEE …, 2022 - ieeexplore.ieee.org
In recent years, the digital world has advanced significantly, particularly on the Internet,
which is critical given that many of our activities are now conducted online. As a result of …

[HTML][HTML] Fine-tuned DenseNet-169 for breast cancer metastasis prediction using FastAI and 1-cycle policy

A Vulli, PN Srinivasu, MSK Sashank, J Shafi, J Choi… - Sensors, 2022 - mdpi.com
Lymph node metastasis in breast cancer may be accurately predicted using a DenseNet-
169 model. However, the current system for identifying metastases in a lymph node is …

Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment

A Mitra, B Bera, AK Das, SS Jamal, I You - Computer Communications, 2023 - Elsevier
Abstract Cognitive Internet of Things (CIoT) supports the organizations to learn from the
information (data) arriving from various connected devices, sensors, machines and other …

[HTML][HTML] Black-box attacks against log anomaly detection with adversarial examples

S Lu, M Wang, D Wang, X Wei, S Xiao, Z Wang… - Information …, 2023 - Elsevier
Deep neural networks (DNNs) have been widely employed to solve log anomaly detection
and outperform a range of conventional methods. They have attained such striking success …

Design and implementation of an intrusion detection system by using extended BPF in the Linux kernel

SY Wang, JC Chang - Journal of Network and Computer Applications, 2022 - Elsevier
An intrusion detection system (IDS) checks the content of headers and payload of packets to
detect intrusions from the network. It is an essential function for network security …

Deep learning approach for complex activity recognition using heterogeneous sensors from wearable device

N Hnoohom, A Jitpattanakul, I You… - 2021 Research …, 2021 - ieeexplore.ieee.org
The classification of simple and complex sequences of operations is made easier according
to the use of heterogeneous sensors from a wearable device. Sensor-based human activity …

Malicious URL detection using NLP, machine learning and FLASK

A Lakshmanarao, MR Babu… - … on innovative computing …, 2021 - ieeexplore.ieee.org
A URL created to attack with spam or fraud is known as a malicious/phishing URL. Viruses
are downloaded into the system if the user clicks such URLs. Malicious URLs can lead to …

Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix

Y Shin, K Kim, JJ Lee, K Lee - Security and Communication …, 2022 - Wiley Online Library
In the past, phishing techniques were a common means of attack carried out by individuals
or small groups via spam mail on a randomly selected target. However, in recent years …

Efficient Classification of Malicious URLs: M-BERT-A Modified BERT Variant for Enhanced Semantic Understanding

B Yu, F Tang, D Ergu, R Zeng, B Ma, F Liu - IEEE Access, 2024 - ieeexplore.ieee.org
Malicious websites present a substantial threat to the security and privacy of individuals
using the internet. Traditional approaches for identifying these malicious sites have …

PICAndro: Packet InspeCtion‐Based Android Malware Detection

V Sihag, G Choudhary, M Vardhan… - Security and …, 2021 - Wiley Online Library
The post‐COVID epidemic world has increased dependence on online businesses for day‐
to‐day life transactions over the Internet, especially using the smartphone or handheld …