Urldeepdetect: A deep learning approach for detecting malicious urls using semantic vector models

S Afzal, M Asim, AR Javed, MO Beg, T Baker - Journal of Network and …, 2021 - Springer
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models.

S Afzal, M Asim, AR Javed, MO Beg… - Journal of Network & …, 2021 - search.ebscohost.com
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

S Afzal, M Asim, AR Javed… - Journal of Network …, 2021 - research.brighton.ac.uk
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

S Afzal, M Asim, AR Javed, MO Beg… - Journal of Network and …, 2021 - dl.acm.org
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

[PDF][PDF] URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

S Afzal, M Asim, AR Javed, MO Beg… - Journal of Network and …, 2021 - researchgate.net
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models

S Afzal, A Muhammad, JA Rehman… - Journal of Network …, 2021 - search.proquest.com
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …