Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
With the rising demand for E-commerce, Social Networking websites, it has become
essential to develop security protocols over the World Wide Web that can provide security …
essential to develop security protocols over the World Wide Web that can provide security …
Determining the efficacy of machine learning strategies in quelling cyber security threats: Evidence from selected literatures
The alarming security threats in the internet world continually raise critical concerns among
individuals, organizations and governments alike. The sophistication of cyber-attacks makes …
individuals, organizations and governments alike. The sophistication of cyber-attacks makes …
[PDF][PDF] Cyber security techniques for detecting and preventing cross-site scripting attacks
O Okusi - World Journal of Innovation and Modern Technology, 2024 - researchgate.net
As the demand as well as use of web application increases daily so also different cyber
security threats to it increases alarmingly. Cross-Site Scripting (XSS) attack is one in which …
security threats to it increases alarmingly. Cross-Site Scripting (XSS) attack is one in which …
Cloud computing load prediction by decomposition reinforced attention long short-term memory network optimized by modified particle swarm optimization algorithm
Computer resources provision over the internet resulted in the wide spread usage of cloud
computing paradigm. With the use of such resources come certain challenges that can …
computing paradigm. With the use of such resources come certain challenges that can …
Phishing Website URL's Detection Using NLP and Machine Learning Techniques
Phishing websites present a severe cybersecurity risk since they can lead to financial
losses, data breaches, and user privacy violations. This study uses machine learning …
losses, data breaches, and user privacy violations. This study uses machine learning …
[HTML][HTML] Phish responder: A hybrid machine learning approach to detect phishing and spam emails
M Dewis, T Viana - Applied System Innovation, 2022 - mdpi.com
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …
[PDF][PDF] Deep learning in phishing mitigation: a uniform resource locator-based predictive model
H Salah, H Zuhair - International Journal of Electrical and Computer …, 2023 - academia.edu
To mitigate the evolution of phish websites, various phishing prediction8 schemes are being
optimized eventually. However, the optimized methods produce gratuitous performance …
optimized eventually. However, the optimized methods produce gratuitous performance …
[PDF][PDF] Machine learning and deep learning based phishing websites detection: The current gaps and next directions
K Adane, B Beyene - Review of Computer Engineering Research, 2022 - academia.edu
To compete with the rest of the world, every country is relying on the internet for cashless
transactions, online commerce, paperless tickets, and other productivity methods. Phishing …
transactions, online commerce, paperless tickets, and other productivity methods. Phishing …
URL based phishing attack detection using BiLSTM-gated highway attention block convolutional neural network
M Nanda, S Goel - Multimedia Tools and Applications, 2024 - Springer
Phishing is an attack that attempts to replicate the official websites of businesses, including
government agencies, financial institutions, e-commerce platforms, and banks. These …
government agencies, financial institutions, e-commerce platforms, and banks. These …
[HTML][HTML] Evolutionary algorithm with deep auto encoder network based website phishing detection and classification
Website phishing is a cyberattack that targets online users for stealing their sensitive data
containing login credential and banking details. The phishing websites appear very similar …
containing login credential and banking details. The phishing websites appear very similar …