A phishing-attack-detection model using natural language processing and deep learning

E Benavides-Astudillo, W Fuertes, S Sanchez-Gordon… - Applied Sciences, 2023 - mdpi.com
Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web
pages that appear legitimate. Currently, one of the most-common ways to detect these …

Prediction of Electric Power Demand of HVACs for Operating Rooms in Case of Dynamic Set Points of Temperature: A Case Study

T Inayat, I Ullah, I Ahmad, A Yasin, M Ahmad - Journal of Computing & …, 2022 - jcbi.org
In healthcare settings, particularly in areas such as operating rooms and intensive care
units, there is a need for a dynamically controlled temperature environment that can adapt to …

A Critical Review of The Intersection of Artificial Intelligence and Cybersecurity

UU Ibekwe, UM Mbanaso… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Cyberattacks have significantly increased in frequency and sophistication over time. The
detection and prevention of potential attacks are becoming very difficult using traditional …

Enhancing Web Security: Hybrid Deep Learning Model for Robust URL Phishing Detection

M Dubey, RRS Makwana - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Security is the primary difficulty in the realm of the Internet and different kinds of electronic
communication. It's significant to remember that phishing is only one of many methods that …

Phishing Site Detection Using Logistic Regression and Fine Tuning It Using Various Optimization Parameters

M Singla, KS Gill, R Chauhan… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Cybercriminals frequently prefer to deceive people into compromising their own security
than using exploits or complex assaults to get access to networks. No matter what …

Social Engineering Threat: Url Phishing Detection Using Hybrid Approach

R Hegde, S SM - papers.ssrn.com
Social engineering threat pose a significant threat to individuals, organizations, and society
as a whole. Detecting and mitigating such attacks is a challenging task due to their …

[引用][C] CONSISTENCY AND STRUCTURE ANALYSIS OF SCHOLARLY PAPERS USING BASED ON NATURAL LANGUAGE PROCESSING