M Ye, X Yan, N Chen, M Jia - Applied Acoustics, 2023 - Elsevier
When the rolling bearing fails, the fault features contained in bearing vibration signal are easily submerged by fortissimo noise interference signals, and have obvious non-stationary …
SS Roy, AI Awad, LA Amare, MT Erkihun, M Anas - Future Internet, 2022 - mdpi.com
In today's world, phishing attacks are gradually increasing, resulting in individuals losing valuables, assets, personal information, etc., to unauthorized parties. In phishing, attackers …
Phishing attacks are a critical and escalating cybersecurity threat in the modern digital landscape. As cybercriminals continually adapt their techniques, automated phishing …
RS Rao, A Umarekar, AR Pais - Telecommunication Systems, 2022 - Springer
Phishing is an attack whose aim is to gain personal information such as passwords, credit card details etc. from online users by deceiving them through fake websites, emails or any …
Phishing is a type of cyber-attack that aims to deceive users, usually using fraudulent web pages that appear legitimate. Currently, one of the most-common ways to detect these …
M Mimura - Expert Systems with Applications, 2023 - Elsevier
Recently, there has been a significant increase in malware attacks and malicious traffic. Consequently, several machine learning-based detection models have been developed to …
E Zhu, Z Chen, J Cui, H Zhong - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
To effectively boost computer usage, machine learning models are used in several phishing detection systems to classify enormous phishing datasets. Based on phishing patterns …
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing …
Insufficient data is one of the main drawbacks in natural language processing tasks, and the most prevalent solution is to collect a decent amount of data that will be enough for the …