Phishing webpage detection: Unveiling the threat landscape and investigating detection techniques
In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers
employ various tactics to deceive users into gathering their sensitive information, potentially …
employ various tactics to deceive users into gathering their sensitive information, potentially …
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and
online shop**. Several techniques compromise Internet security, including hacking, SQL …
online shop**. Several techniques compromise Internet security, including hacking, SQL …
[HTML][HTML] Automatic decision tree-based nidps ruleset generation for dos/ddos attacks
As the occurrence of Denial of Service and Distributed Denial of Service (DoS/DDoS)
attacks increases, the demand for effective defense mechanisms increases. Recognition of …
attacks increases, the demand for effective defense mechanisms increases. Recognition of …
ELRL-MD: a deep learning approach for myocarditis diagnosis using cardiac magnetic resonance images with ensemble and reinforcement learning integration
AMM Kasmaee, A Ataei, SV Moravvej… - Physiological …, 2024 - iopscience.iop.org
Objective. Myocarditis poses a significant health risk, often precipitated by viral infections
like coronavirus disease, and can lead to fatal cardiac complications. As a less invasive …
like coronavirus disease, and can lead to fatal cardiac complications. As a less invasive …
[HTML][HTML] Sinner: A reward-sensitive algorithm for imbalanced malware classification using neural networks with experience replay
Reports produced by popular malware analysis services showed a disparity in samples
available for different malware families. The unequal distribution between such classes can …
available for different malware families. The unequal distribution between such classes can …
Deep reinforcement learning-based malicious url detection with feature selection
Data theft through web applications that emulate legitimate platforms constitutes a major
network security issue. Countermeasures using artificial intelligence (AI)-based systems are …
network security issue. Countermeasures using artificial intelligence (AI)-based systems are …
A Hybrid Framework for Improved Weighted Quantum Particle Swarm Optimization and Fast Mask Recurrent CNN to Enhance Phishing-URL Prediction Performance
SS Kumar, P Muthusamy, MPA Jerald - International Journal of …, 2024 - Springer
Phishing websites are cybercrimes that aim to collect confidential data, including bank card
numbers, bank accounts, and credentials. To detect phishing sites, specialists must extract …
numbers, bank accounts, and credentials. To detect phishing sites, specialists must extract …
Improving unbalanced image classification through fine-tuning method of reinforcement learning
JQ Wang, L Guo, Y Jiang, S Zhang, Q Zhou - Applied Soft Computing, 2024 - Elsevier
Image classification, especially unbalanced image classification, holds considerable
promise for practical applications. Existing research focuses mainly on enhancing the …
promise for practical applications. Existing research focuses mainly on enhancing the …
A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics
P Artioli, A Maci, A Magrì - Frontiers in big Data, 2024 - frontiersin.org
Introduction Government agencies are now encouraging industries to enhance their security
systems to detect and respond proactively to cybersecurity incidents. Consequently …
systems to detect and respond proactively to cybersecurity incidents. Consequently …
Exploring the Efficacy of Federated-Continual Learning Nodes with Attention-Based Classifier for Robust Web Phishing Detection: An Empirical Investigation
R Adhithya, M Revathi - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
Web phishing poses a dynamic threat, requiring detection systems to quickly adapt to the
latest tactics. Traditional approaches of accumulating data and periodically retraining …
latest tactics. Traditional approaches of accumulating data and periodically retraining …