[HTML][HTML] A recent overview of the state-of-the-art elements of text classification
The aim of this study is to provide an overview the state-of-the-art elements of text
classification. For this purpose, we first select and investigate the primary and recent studies …
classification. For this purpose, we first select and investigate the primary and recent studies …
Web page classification: Features and algorithms
Classification of Web page content is essential to many tasks in Web information retrieval
such as maintaining Web directories and focused crawling. The uncontrolled nature of Web …
such as maintaining Web directories and focused crawling. The uncontrolled nature of Web …
Phishing or not phishing? A survey on the detection of phishing websites
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …
brands. Although this threat has been around for quite a long time, it is still very active and …
Learning to detect malicious urls
Malicious Web sites are a cornerstone of Internet criminal activities. The dangers of these
sites have created a demand for safeguards that protect end-users from visiting them. This …
sites have created a demand for safeguards that protect end-users from visiting them. This …
Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
Classifying illegal activities on tor network based on web textual contents
The freedom of the Deep Web offers a safe place where people can express themselves
anonymously but they also can conduct illegal activities. In this paper, we present and make …
anonymously but they also can conduct illegal activities. In this paper, we present and make …
Detecting malicious URLs using machine learning techniques
The World Wide Web supports a wide range of criminal activities such as spam-advertised e-
commerce, financial fraud and malware dissemination. Although the precise motivations …
commerce, financial fraud and malware dissemination. Although the precise motivations …
Dimmwitted: A study of main-memory statistical analytics
We perform the first study of the tradeoff space of access methods and replication to support
statistical analytics using first-order methods executed in the main memory of a Non-Uniform …
statistical analytics using first-order methods executed in the main memory of a Non-Uniform …
Cost-sensitive online active learning with application to malicious URL detection
Malicious Uniform Resource Locator (URL) detection is an important problem in web search
and mining, which plays a critical role in internet security. In literature, many existing studies …
and mining, which plays a critical role in internet security. In literature, many existing studies …
Purely URL-based topic classification
Given only the URL of a web page, can we identify its topic? This is the question that we
examine in this paper. Usually, web pages are classified using their content, but a URL-only …
examine in this paper. Usually, web pages are classified using their content, but a URL-only …