[HTML][HTML] Cybersecurity threats and their mitigation approaches using Machine Learning—A Review

M Ahsan, KE Nygard, R Gomes… - … of Cybersecurity and …, 2022 - mdpi.com
Machine learning is of rising importance in cybersecurity. The primary objective of applying
machine learning in cybersecurity is to make the process of malware detection more …

Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods

T Mazhar, HM Irfan, S Khan, I Haq, I Ullah, M Iqbal… - Future Internet, 2023 - mdpi.com
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …

[HTML][HTML] Evaluation of machine learning algorithm on drinking water quality for better sustainability

S Kaddoura - Sustainability, 2022 - mdpi.com
Water has become intricately linked to the United Nations' sixteen sustainable development
goals. Access to clean drinking water is crucial for health, a fundamental human right, and a …

Phishing email detection model using deep learning

S Atawneh, H Aljehani - Electronics, 2023 - mdpi.com
Email phishing is a widespread cyber threat that can result in the theft of sensitive
information and financial loss. It uses malicious emails to trick recipients into providing …

Lightweight URL-based phishing detection using natural language processing transformers for mobile devices

K Haynes, H Shirazi, I Ray - Procedia Computer Science, 2021 - Elsevier
Hackers are increasingly launching phishing attacks via SMS and social media. Games and
dating apps introduce yet another attack vector. However, current deep learning-based …

Supervised term-category feature weighting for improved text classification

J Attieh, J Tekli - Knowledge-Based Systems, 2023 - Elsevier
Text classification is a central task in Natural Language Processing (NLP) that aims at
categorizing text documents into predefined classes or categories. It requires appropriate …

Double-layer detection of internal threat in enterprise systems based on deep learning

D He, X Lv, X Xu, S Chan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, phishing email-mediated attacks are proliferating. When victims are
enterprise employees, internal security of the enterprise systems will also be threatened …

Arabic spam tweets classification using deep learning

S Kaddoura, SA Alex, M Itani, S Henno… - Neural Computing and …, 2023 - Springer
With the increased use of social network sites, such as Twitter, attackers exploit these
platforms to spread counterfeit content. Such content can be fake advertisements or illegal …

[HTML][HTML] A hybrid NLP and domain validation technique for disposable email detection

R Alanazi, S Alanazi - Alexandria Engineering Journal, 2024 - Elsevier
Disposable email address services have gained popularity recently, offering users a way to
register for online services without revealing their primary email. However, this poses …

A new english/arabic parallel corpus for phishing emails

S Salloum, T Gaber, S Vadera, K Shaalan - ACM Transactions on Asian …, 2023 - dl.acm.org
Phishing involves malicious activity whereby phishers, in the disguise of legitimate entities,
obtain illegitimate access to the victims' personal and private information, usually through …