CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet

M Hussain, C Cheng, R Xu, M Afzal - Information Sciences, 2023 - Elsevier
Phishing scams are increasing as the technical skills and costs of phishing attacks diminish,
emphasizing the need for rapid, precise, and low-cost prevention measures. Based on a …

[HTML][HTML] Intelligent deep machine learning cyber phishing url detection based on bert features extraction

M Elsadig, AO Ibrahim, S Basheer, MA Alohali… - Electronics, 2022 - mdpi.com
Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a
form of fraud that attracts people and businesses to access malicious uniform resource …

Efficient traffic-based IoT device identification using a feature selection approach with Lévy flight-based sine chaotic sub-swarm binary honey badger algorithm

B Wang, H Kang, G Sun, J Li - Applied Soft Computing, 2024 - Elsevier
Abstract Internet of Things (IoT) refers to the various devices connected to the Internet,
enabling them to communicate and transmit data with each other. The rapid development of …

An efficient hybrid feature selection technique towards prediction of suspicious URLs in IoT environment

S Mohanty, AA Acharya, T Gaber, N Panda… - IEEE …, 2024 - ieeexplore.ieee.org
With the growth of IoT, a vast number of devices are connected to the web. Consequently,
both users and devices are susceptible to deception by intruders through malicious links …

Graph-based phishing detection: URLGBM model driven by machine learning

A Elkouay, N Moussa, A Madani - International Journal of …, 2024 - Taylor & Francis
Phishing attacks are a form of social engineering that involves the transmission of deceptive
communications imitating a trustworthy source to deceive users into revealing confidential …

Xrrf: An explainable reasonably randomised forest algorithm for classification and regression problems

N Jain, PK Jana - Information Sciences, 2022 - Elsevier
Tree-based ensemble algorithms (TEAs) have had a transformative impact in various fields.
However, when they are applied to real-time critical problems such as medical analysis …

An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL)

S Sankaranarayanan, AT Sivachandran… - Plos one, 2024 - journals.plos.org
Web applications are important for various online businesses and operations because of
their platform stability and low operation cost. The increasing usage of Internet-of-Things …

Safeguarding the IoT: taxonomy, security solutions, and future research opportunities

A Patel, D Patel, R Kakkar, P Oza, S Agrawal… - Security and …, 2024 - Wiley Online Library
With the advancement of innovative technologies, the Internet of Things (IoT) has become
quite popular in various applications such as smart homes, smart cities, agriculture …

[PDF][PDF] An Intelligent System for Detecting Fake Materials on the Internet

AS Noah, NE Ghannam, GA Elsharawy… - International Journal of …, 2023 - mecs-press.org
There has been a significant rise in internet usage in recent years, which has led to the
presence of data theft and the diversity of counterfeit materials. This has resulted the …

IoT Phishing Detection Using Hybrid NLP and Machine Learning Models Enhanced with Contextual Embedding

F Jaafar, D Ameyed, L Titare… - 2023 IEEE 23rd …, 2023 - ieeexplore.ieee.org
Phishing attacks are currently the most spread type of cyber attacks. A lot of work has been
carried out dealing with traditional phishing (Smishing, Vishing, Email phishing, etc.) having …