Urltran: Improving phishing url detection using transformers

P Maneriker, JW Stokes, EG Lazo… - MILCOM 2021-2021 …, 2021 - ieeexplore.ieee.org
Browsers often include security features to detect phishing web pages. In the past, some
browsers evaluated an unknown URL for inclusion in a list of known phishing pages …

A comprehensive literature review on phishing URL detection using deep learning techniques

E Kritika - Journal of Cyber Security Technology, 2024 - Taylor & Francis
Strong and efficient defences have to be developed in response to the more-sophisticated
phishing attempts is deep learning algorithms. The extensive analysis, which spans 41 …

An explainable multi-modal hierarchical attention model for developing phishing threat intelligence

Y Chai, Y Zhou, W Li, Y Jiang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Phishing website attack, as one of the most persistent forms of cyber threats, evolves and
remains a major cyber threat. Various detection methods (eg, lookup systems, fraud cue …

A novel approach for malicious URL detection based on the joint model

JT Yuan, YP Liu, L Yu - Security and Communication Networks, 2021 - Wiley Online Library
The number of malicious websites is increasing yearly, and many companies and
individuals worldwide have suffered losses. Therefore, the detection of malicious websites is …

Malicious Address Identifier (MAI): A Browser Extension to Identify Malicious URLs

O Jaiswal, P Asare, J Gadgilwar… - … on Emerging Trends …, 2023 - ieeexplore.ieee.org
Many websites have emerged since the internet was introduced. Every day, people visit a
variety of websites, and they unknowingly click on malicious URLs because they simply …

Malicious url classification using deep neural network

M Sen, KS Ray, A Chakrabarti - 2021 IEEE 18th India Council …, 2021 - ieeexplore.ieee.org
One of the most serious cybersecurity threats has been discovered as malicious URL
classification. People are duped into believing they are visiting a respectable website, and …

A study on the detection method for malicious urls based on a number of search results matching the internet search engines combining the machine learning

M Jang, J Song, M Kim - Journal of Electrical Engineering & Technology, 2022 - Springer
With the development of IoT technology, everything in our daily lives became connected,
forming a hyperconnected society. Subsequently, the importance of cyber security is being …

[PDF][PDF] Research on named entity recognition method of network threat intelligence

K Zhang, X Chen, Y Jing, S Wang… - China Cyber Security …, 2022 - library.oapen.org
With the continuous emergence of new network threat means, how to turn passive defense
into active prediction, the rise of Cyber Threat Intelligence (CTI) technology provides a new …

融合SENet 和Transformer 的应用层协议识别方法.

陈乾, 洪征, 司健鹏 - … of Frontiers of Computer Science & …, 2024 - search.ebscohost.com
协议识别技术在网络通信和信息安全领域具有至关重要的地位和作用. 针对现有基于时空特征的
协议识别方法提取协议特征不充分, 不全面的问题, 提出了一种基于SENet 和Transformer …

Deep Learning Techniques for Multi-Class Classification of Cardiac Sounds

SS Raut, PK Deshmukh - 2024 10th International Conference …, 2024 - ieeexplore.ieee.org
This research implements deep learning techniques to classify cardiac sounds based on
mel-frequency spectrogram features, aiming to enhance diagnostic accuracy for heart …