Phishing detection system through hybrid machine learning based on URL

A Karim, M Shahroz, K Mustofa, SB Belhaouari… - IEEE …, 2023 - ieeexplore.ieee.org
Currently, numerous types of cybercrime are organized through the internet. Hence, this
study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has …

[PDF][PDF] Construction system and environment adaptation of traditional architecture in Moluccas Island

M Rahim, M Ibrahim, F Marasabessy - Civil Engineering and …, 2021 - academia.edu
Traditional architecture has a variety of original and smart techniques to meet various needs
according to the cultural context and natural conditions. Moluccas Islands is a natural …

Phishing detection system through hybrid machine learning based on URL

M Suman, LY Ravin, RS Spandana… - Computer Science …, 2024 - taylorfrancis.com
Phishing attacks, which aim to obtain sensitive information from unsuspecting users, remain
a straightforward method for cybercriminals. They represent a common and inadequately …

The Mound and the Malay Nusantara Historic Landscape

N Baniyamin, M Zain, M Ibrahim - Eco-Urbanism and the South East Asian …, 2023 - Springer
The existence and formation of historic urbanscapes in Southeast Asia are characterised by
geographical landforms such as hills, mounds, and mountains. Other than river sites …

[PDF][PDF] Developing a Phishing Detection System Utilizing a Hybrid Machine Learning Approach Focused on URL Analysis

K Sudhakar, GL Pujitha, K Venu, CH JayaSri… - ijses.com
Cybercrimes of all kinds are coordinated these days via the internet. Thus, phishing attempts
are the main focus of this research. The main technique used in phishing attacks is email …

[PDF][PDF] Phishing Detection System Through Hybrid Machine Learning Based on URL

GR Kumar, M Srikanth - International Journal of Marketing Management, 2024 - ijmm.in
ABSTRACTCurrently, numerous types of cybercrime are organized through the internet, with
phishingattacks being a primary focus of this study. Despite its origins in 1996, phishing has …

[PDF][PDF] PHISHING URL DETECTION A REAL-CASE SCENARIO THROUGH LOGIN URLS

AD Devi, K Rakesh - jnao-nu.com
Currently, numerous types of cybercrime are organized through the internet. Hence, this
study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has …

[引用][C] The Serendipitious City in South East Asia— Urban Archetypal Design Principles from the Morphological ‘ Vernacular’

PS Jahnkassim, K Kamaruddin… - … and Design Review, 2022 - ojs.piscomed.com
Abstract †Serendipitious’ has been defined as occurring or discovered by chance in a
happy or beneficial way. †œA serendipitous encounter†thus generally means one or a …

[PDF][PDF] THECHANGING AND DECLINE OF JOHOR KANGKAR SETTLEMENTS: A CASE STUDY OF MUAR, JOHOR

HC Low, RNR Shahminan - eprints.utm.my
Kangkar is a traditional Chinese historic settlement in Johor, which established during
Kangchu system from 1844 to 1917 represents strong historical significance in the Chinese …