Twenty years of machine-learning-based text classification: A systematic review
Machine-learning-based text classification is one of the leading research areas and has a
wide range of applications, which include spam detection, hate speech identification …
wide range of applications, which include spam detection, hate speech identification …
Traditional and blockchain based IoT and IIoT security in the context of agriculture: a survey
Agriculture is an inevitable area for research that must be prioritized as the world population
is continuously growing. To meet agricultural product demand, agricultural processes from …
is continuously growing. To meet agricultural product demand, agricultural processes from …
Detection of adversarial phishing attack using machine learning techniques
KM Sudar, M Rohan, K Vignesh - Sādhanā, 2024 - Springer
The frequency of cyberattacks, particularly phishing attacks, is increasing exponentially
every day. Many users fall victim to clicking on malicious URLs, leading to the exploitation of …
every day. Many users fall victim to clicking on malicious URLs, leading to the exploitation of …
[PDF][PDF] Enhanced website phishing detection based on the cyber kill chain and cloud computing
Crimeware-as-a-service (CaaS) presents a growing cybersecurity threat by facilitating the
acquisition of tools for website phishing attacks. Detecting these attacks requires effective …
acquisition of tools for website phishing attacks. Detecting these attacks requires effective …
A feature extraction approach for the detection of phishing websites using machine learning
SC Gundla, MP Karthik, MJK Reddy… - Journal of Circuits …, 2024 - World Scientific
In this growing world of the internet, most of our daily routine tasks are somehow connected
to the internet, from smartphones to internet of things (IoT) devices to cloud networks …
to the internet, from smartphones to internet of things (IoT) devices to cloud networks …
Comparison of performance of classification algorithms using standard deviation-based feature selection in cyber attack datasets
A Şenol - International Journal of Pure and Applied Sciences, 2023 - dergipark.org.tr
Supervised machine learning techniques are commonly used in many areas like finance,
education, healthcare, engineering, etc. because of their ability to learn from past data …
education, healthcare, engineering, etc. because of their ability to learn from past data …
Identification and mitigation of phishing email attacks using deep learning
J Ramprasath, S Priyanka, R Manudev… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Internet security is seriously threatened by email-based internet phishing. The process of
completely hiding the sender information of a phishing mails is far less flexible than the …
completely hiding the sender information of a phishing mails is far less flexible than the …
Classification of Phishing Website Using Machine Learning Based Proposed Ensemble Model
P Pathak, AK Shrivas - 2022 OPJU International Technology …, 2023 - ieeexplore.ieee.org
Phishing is the process of trying to get sensitive data from unauthorized persons, such as
usernames, passwords, credit card numbers, and debit card information. Since there is no …
usernames, passwords, credit card numbers, and debit card information. Since there is no …
A Compendium on Risk Assessment of Phishing Attack Using Attack Modeling Techniques
With the advent of new attacking methodologies and types of attacks, it has become difficult
to protect the systems. Therefore, it is necessary to decipher the impact of attacks before and …
to protect the systems. Therefore, it is necessary to decipher the impact of attacks before and …
[PDF][PDF] Discrete mathematical models for enhancing cybersecurity: A mathematical and statistical analysis of machine learning approaches in phishing attack detection
This paper presents a discreate mathematical modelling of cybersecurity phishing attack
detection methodologies, emphasizing the crucial role of continual advancements in …
detection methodologies, emphasizing the crucial role of continual advancements in …