Machine learning in IoT security: Current solutions and future challenges
The future Internet of Things (IoT) will have a deep economical, commercial and social
impact on our lives. The participating nodes in IoT networks are usually resource …
impact on our lives. The participating nodes in IoT networks are usually resource …
A systematic literature review on phishing email detection using natural language processing techniques
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …
economy. Phishing attacks are now most often carried out by email. To better comprehend …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
Machine learning and deep learning methods for cybersecurity
Y **n, L Kong, Z Liu, Y Chen, Y Li, H Zhu, M Gao… - Ieee …, 2018 - ieeexplore.ieee.org
With the development of the Internet, cyber-attacks are changing rapidly and the cyber
security situation is not optimistic. This survey report describes key literature surveys on …
security situation is not optimistic. This survey report describes key literature surveys on …
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
In recent times, we can see a massive increase in the number of devices that are being
connected to the internet. These devices include but are not limited to smartphones, IoT, and …
connected to the internet. These devices include but are not limited to smartphones, IoT, and …
Applications of deep learning for phishing detection: a systematic literature review
Phishing attacks aim to steal confidential information using sophisticated methods,
techniques, and tools such as phishing through content injection, social engineering, online …
techniques, and tools such as phishing through content injection, social engineering, online …
Real‑time COVID-19 diagnosis from X-Ray images using deep CNN and extreme learning machines stabilized by chimp optimization algorithm
Real-time detection of COVID-19 using radiological images has gained priority due to the
increasing demand for fast diagnosis of COVID-19 cases. This paper introduces a novel two …
increasing demand for fast diagnosis of COVID-19 cases. This paper introduces a novel two …
Deep learning for phishing detection: Taxonomy, current challenges and future directions
Phishing has become an increasing concern and captured the attention of end-users as well
as security experts. Existing phishing detection techniques still suffer from the deficiency in …
as security experts. Existing phishing detection techniques still suffer from the deficiency in …
URLNet: Learning a URL representation with deep learning for malicious URL detection
Malicious URLs host unsolicited content and are used to perpetrate cybercrimes. It is
imperative to detect them in a timely manner. Traditionally, this is done through the usage of …
imperative to detect them in a timely manner. Traditionally, this is done through the usage of …
Analysis of the performance impact of fine-tuned machine learning model for phishing URL detection
SR Abdul Samad, S Balasubaramanian, AS Al-Kaabi… - Electronics, 2023 - mdpi.com
Phishing leverages people's tendency to share personal information online. Phishing
attacks often begin with an email and can be used for a variety of purposes. The …
attacks often begin with an email and can be used for a variety of purposes. The …