A comprehensive literature review on phishing URL detection using deep learning techniques
E Kritika - Journal of Cyber Security Technology, 2024 - Taylor & Francis
Strong and efficient defences have to be developed in response to the more-sophisticated
phishing attempts is deep learning algorithms. The extensive analysis, which spans 41 …
phishing attempts is deep learning algorithms. The extensive analysis, which spans 41 …
BERT-Based Approaches to Identifying Malicious URLs
MY Su, KL Su - Sensors, 2023 - mdpi.com
Malicious uniform resource locators (URLs) are prevalent in cyberattacks, particularly in
phishing attempts aimed at stealing sensitive information or distributing malware. Therefore …
phishing attempts aimed at stealing sensitive information or distributing malware. Therefore …
Detection of Cloned Attacks in Connecting Media using Bernoulli RBM_RF Classifier (BRRC)
The majority of people are using connecting media in recent times, like Facebook, Twitter,
LinkedIn, etc. People like to communicate on social websites as compared to direct …
LinkedIn, etc. People like to communicate on social websites as compared to direct …
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)
MA Elberri, Ü Tokeşer, J Rahebi… - International Journal of …, 2024 - Springer
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal
sensitive user information. Deep learning techniques, particularly convolutional neural …
sensitive user information. Deep learning techniques, particularly convolutional neural …
Tree-based Ensemble Machine Learning for Phishing Website Detection
H Fadhilah, DR Maulana, R Utari - Komputika: Jurnal Sistem …, 2024 - ojs.unikom.ac.id
Phishing remains a prevalent and perilous cyber threat in the digital age, exploiting human
vulnerabilities to deceive individuals into disclosing sensitive information. This paper …
vulnerabilities to deceive individuals into disclosing sensitive information. This paper …
Enhanced Authorship Verification for Textual Similarity with Siamese Deep Learning
RI Aouchiche, F Boumahdi… - Journal of Mobile …, 2024 - journals.riverpublishers.com
The internet is filled with documents written under false names or without revealing the
author's identity. Identifying the authorship of these documents can help decrease the …
author's identity. Identifying the authorship of these documents can help decrease the …
Survey of Website Phishing Detection Based Deep Learning Approach
Phishing is a special type of network attack and is one of the most common social
engineering techniques and easiest to use cybercrimes faced by general Internet users …
engineering techniques and easiest to use cybercrimes faced by general Internet users …
Experience Replay: A value-based deep reinforcement approach for Malicious URL Detection in the Tor Browser
K Sakthivel, V Srinithi, S Swetha… - 2024 7th International …, 2024 - ieeexplore.ieee.org
Finding malicious URLs in Tor is vital for preserving network security and privacy.
Subsequently, Tor affords anonymity by routing traffic over a sequence of relays, it's …
Subsequently, Tor affords anonymity by routing traffic over a sequence of relays, it's …
Hate Speech Prediction on Social Media
In order to stop hate speech spreaders on social media, researchers started developing
machine learning systems that automatically detect hate speech. In this paper we present …
machine learning systems that automatically detect hate speech. In this paper we present …
Development of a Software Tool for Searching Fake Educational Domain Names
AN Privalov, VA Smirnov - 2023 3rd International Conference …, 2023 - ieeexplore.ieee.org
The article discusses the latest research on the problem of fake activity associated with the
creation of phishing sites and the sending of phishing emails. The relevance of this problem …
creation of phishing sites and the sending of phishing emails. The relevance of this problem …