Detecting malicious URLs using machine learning techniques: review and research directions
M Aljabri, HS Altamimi, SA Albelali, M Al-Harbi… - IEEE …, 2022 - ieeexplore.ieee.org
In recent years, the digital world has advanced significantly, particularly on the Internet,
which is critical given that many of our activities are now conducted online. As a result of …
which is critical given that many of our activities are now conducted online. As a result of …
[HTML][HTML] Fine-tuned DenseNet-169 for breast cancer metastasis prediction using FastAI and 1-cycle policy
Lymph node metastasis in breast cancer may be accurately predicted using a DenseNet-
169 model. However, the current system for identifying metastases in a lymph node is …
169 model. However, the current system for identifying metastases in a lymph node is …
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment
Abstract Cognitive Internet of Things (CIoT) supports the organizations to learn from the
information (data) arriving from various connected devices, sensors, machines and other …
information (data) arriving from various connected devices, sensors, machines and other …
[HTML][HTML] Black-box attacks against log anomaly detection with adversarial examples
Deep neural networks (DNNs) have been widely employed to solve log anomaly detection
and outperform a range of conventional methods. They have attained such striking success …
and outperform a range of conventional methods. They have attained such striking success …
Design and implementation of an intrusion detection system by using extended BPF in the Linux kernel
SY Wang, JC Chang - Journal of Network and Computer Applications, 2022 - Elsevier
An intrusion detection system (IDS) checks the content of headers and payload of packets to
detect intrusions from the network. It is an essential function for network security …
detect intrusions from the network. It is an essential function for network security …
Deep learning approach for complex activity recognition using heterogeneous sensors from wearable device
The classification of simple and complex sequences of operations is made easier according
to the use of heterogeneous sensors from a wearable device. Sensor-based human activity …
to the use of heterogeneous sensors from a wearable device. Sensor-based human activity …
Malicious URL detection using NLP, machine learning and FLASK
A Lakshmanarao, MR Babu… - … on innovative computing …, 2021 - ieeexplore.ieee.org
A URL created to attack with spam or fraud is known as a malicious/phishing URL. Viruses
are downloaded into the system if the user clicks such URLs. Malicious URLs can lead to …
are downloaded into the system if the user clicks such URLs. Malicious URLs can lead to …
Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix
In the past, phishing techniques were a common means of attack carried out by individuals
or small groups via spam mail on a randomly selected target. However, in recent years …
or small groups via spam mail on a randomly selected target. However, in recent years …
Efficient Classification of Malicious URLs: M-BERT-A Modified BERT Variant for Enhanced Semantic Understanding
Malicious websites present a substantial threat to the security and privacy of individuals
using the internet. Traditional approaches for identifying these malicious sites have …
using the internet. Traditional approaches for identifying these malicious sites have …
PICAndro: Packet InspeCtion‐Based Android Malware Detection
The post‐COVID epidemic world has increased dependence on online businesses for day‐
to‐day life transactions over the Internet, especially using the smartphone or handheld …
to‐day life transactions over the Internet, especially using the smartphone or handheld …