Analysis of the performance impact of fine-tuned machine learning model for phishing URL detection

SR Abdul Samad, S Balasubaramanian, AS Al-Kaabi… - Electronics, 2023 - mdpi.com
Phishing leverages people's tendency to share personal information online. Phishing
attacks often begin with an email and can be used for a variety of purposes. The …

An overview of machine learning algorithms for detecting phishing attacks on electronic messaging services

A Kovač, I Dunđer, S Seljan - 2022 45th Jubilee International …, 2022 - ieeexplore.ieee.org
Phishing attacks have become today one of the most common security breaches performed
on different communication channels. Their goal is to direct users to malicious websites or to …

Weighted ensemble classifier for malicious link detection using natural language processing

S Balasubaramanian, P Ganesan… - International Journal of …, 2023 - emerald.com
Purpose The internet has completely merged into contemporary life. People are addicted to
using internet services for everyday activities. Consequently, an abundance of information …

Taxonomy of Malicious URL Detection Techniques

D Orozco-Fonseca, G Marín, A Lara - International Conference on …, 2024 - Springer
Malicious URLs are often used by phishing campaigns, botnets and other attacks. Indeed,
DNS traffic is necessary for the Internet to function correctly, which means that this data flow …

[图书][B] Improving Municipal Cyber Resiliency with a Predictive Model to Strategically Time Phishing Tests

RM Hill - 2022 - search.proquest.com
Municipalities are one of the most targeted sectors for cybercriminals. They are vulnerable
attack targets because they store personally identifiable information about residents. Cities …

Check for Taxonomy of Malicious URL Detection Techniques Diego Orozco-Fonseca), Gabriela Marín, and Adrian Lara Universidad de Costa Rica, San José, Costa …

D Orozco-Fonseca - Information Technology and Systems: ICITS 2024 … - books.google.com
Malicious URLs are often used by phishing campaigns, botnets and other attacks. Indeed,
DNS traffic is necessary for the Internet to function correctly, which means that this data flow …