A Machine Learning Model for Predicting Phishing Websites

GO Boussi, H Gupta, SA Hossain - 2023 - researchsquare.com
There are various types of cybercrime, and hackers often target specific ones for different
reasons, such as financial gain, recognition, or even revenge. Cybercrimes can occur …

[PDF][PDF] A MALICIOUS URL DETECTION FRAMEWORK USING PRIORITY COEFFICIENT AND FEATURE EVALUATION

AS RAFSANJANI - 2023 - eprints.utm.my
ABSTRACT Malicious Uniform Resource Locators (URLs) are one of the major threats in
cybersecurity. Cyber attackers spread malicious URLs to carry out attacks such as phishing …

Analysis for malicious URLs using machine learning and deep learning approaches

SK Birthriya, AK Jain - Proceedings of the International Conference on …, 2021 - Springer
Abstract The Malicious Uniform Resource Locator (URL) is the primary mechanism for
hosting unsolicited content, for example, spam, malicious ads, phishing, drive-outs, etc …

Enhancing Malicious Url Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation

A Sahban Rafsanjani, N Kamaruddin, M Behjati… - Norshaliza and Behjati … - papers.ssrn.com
Abstract Malicious Uniform Resource Locators (URLs) pose a significant cybersecurity threat
by carrying out attacks such as phishing and malware propagation. Conventional malicious …

[PDF][PDF] Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions

E HERRERA-VIEDMA - eprints.utm.my
Phishing has become an increasing concern and captured the attention of end-users as well
as security experts. Existing phishing detection techniques still suffer from the deficiency in …

Investigating the Security of Emerging Web Technologies and their Role in Social Engineering Attacks

K Subramani - 2021 - search.proquest.com
Owing to the drastic increase in the number of Internet users, web applications are moving
towards providing a native-app like user experience. This transition has in turn given rise to …

[PDF][PDF] A Critical Study of Social Engineering vis-a-vis Phishing Attacks

NB Andaluri, A Srivastava, R Andaluri - 2023 - researchgate.net
The present study aims to present a Critical & Exploitable pattern used in Social Engineering
attacks vis-a-vis Phishing attacks and different ways to counter measure those attacks. The …

[HTML][HTML] IEEE Access

NQ Do - studfile.net
technologies in a hybrid approach are new research directions for phishing detection. Based
on the above analysis, we believe that this study will serve as a valuable reference for …

[PDF][PDF] The semantics of persuasion: a case study using phishing emails

JJ van der Laan - 2021 - unbscholar.lib.unb.ca
As of 2021, phishing emails continue to be the primary means by which network breaches
are facilitated. Notwithstanding the development of many tools to detect and block incoming …

An Implementation of an Algorithm for Information Theft Using Deep Learning Techniques: An Ethical Hacking Event

CA Estrada, W Fuertes, JD Castro… - … Congress on Science …, 2021 - Springer
Ethical hacking is modern data protection and prevention technique proper to prevent
information losses. Under this precept, this study aims to design and implement an algorithm …