XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

M Al-Fayoumi, B Alhijawi… - … Journal of Online & …, 2024 - search.ebscohost.com
The rapid growth of the Internet has led to an increased demand for online services.
However, this surge in online activity has also brought about a new threat: phishing attacks …

[PDF][PDF] Enhanced analysis approach to detect phishing attacks during COVID-19 crisis

MTM Ja'far, M Al-Fawa'reh, M Barhoush, MH Alshira'H - 2022 - sciendo.com
Public health responses to the COVID-19 pandemic since March 2020 have led to
lockdowns and social distancing in most countries around the world, with a shift from the …

[PDF][PDF] Enhanced epileptic seizure diagnosis using EEG signals with support vector machine and bagging classifiers

R Alrawashdeh, M Al-Fawa'reh… - International Journal of …, 2021 - academia.edu
Electroencephalogram (EEG) to detect epilepsy seizures in their early stages. Epilepsy
seizure is a severe neurological disease. Practitioners continue to rely on manual testing of …

Detection of phishing URLs using machine learning and deep learning models implementing a URL feature extractor

A Mahesh, P Seshadri, S Mishra… - … and Applications of …, 2023 - Wiley Online Library
Phishing is a deceitful process by which an attacker tries to steal sensitive information from a
naïve user. These types of attacks are generally carried out through emails, text messages …

Develo** a Model to Detect Malicious URLs using Different Classification Algorithms

J Hariri, L Batouq, A Al-Jarf - 2024 21st Learning and …, 2024 - ieeexplore.ieee.org
The number of social media users in Saudi Arabia is increasing by the day, and the rate of
cyberattacks has increased accordingly. This can be partially due to the dearth of tools that …

Fast and reliable DDoS detection using dimensionality reduction and machine learning

Z Ashi, L Aburashed, M Al-Fawa'reh… - 2020 15th …, 2020 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) Attack poses a rising threat on cloud computing
systems in which the attacker exploits machines from outside and inside the cloud system to …

[PDF][PDF] Respiratory failure in covid-19 patients a comparative study of smokers to nonsmokers

M Kharabsheh, S Banitaan, H Alomari… - Indonesian Journal of …, 2022 - academia.edu
For many decades, smoking tobacco has been a crucial concern due to respiratory failure.
The potential relationship between smoking and COVID-19 has been recently investigated …

[PDF][PDF] Enhancing Machine Learning Detection Technique to Secure E-mail Communication against Malware-based Phishing Attacks

EKL Kisambu, M Mjahidi, TS Kondo - International Journal of …, 2024 - academia.edu
Phishing attacks are among the most significant threats to Internet users and are challenging
to identify and protect. In the fight against phishing attacks, several approaches including …

Email & Fraud Protection con tecnologie open source= Email & Fraud Protection with open source technologies

S Fasolis - 2023 - webthesis.biblio.polito.it
Le email sono uno dei principali mezzi di comunicazione odierni. Nonostante l'uso massivo
della messaggistica istantanea e dei numerosi social media disponibili, le email continuano …

[PDF][PDF] PHISHING IDENTIFICATION THROUGH UP-TO-DATE FEATURES GENERATION AND EXPLORATION

LH Abed, HJ Mohammed, YS Yaseen - iotpe.tabaelm.com
With the growing developments of digital technologies, advanced web applications have
offered a convenient way to undertake daily vital services for individuals and enterprises …