[HTML][HTML] A recent overview of the state-of-the-art elements of text classification

MM Mirończuk, J Protasiewicz - Expert Systems with Applications, 2018 - Elsevier
The aim of this study is to provide an overview the state-of-the-art elements of text
classification. For this purpose, we first select and investigate the primary and recent studies …

Web page classification: Features and algorithms

X Qi, BD Davison - ACM computing surveys (CSUR), 2009 - dl.acm.org
Classification of Web page content is essential to many tasks in Web information retrieval
such as maintaining Web directories and focused crawling. The uncontrolled nature of Web …

[PDF][PDF] 基于机器学习的文本分类技术研究进展

苏金树, 张博锋, 徐昕[1 - 软件学报, 2006 - Citeseer
文本自动分类是信息检索与数据挖掘领域的研究热点与核心技术, 近年来得到了广泛的关注和
快速的发展. 提出了基于机器学习的文本分类技术所面临的互联网内容信息处理等复杂应用的 …

Phishing or not phishing? A survey on the detection of phishing websites

R Zieni, L Massari, MC Calzarossa - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …

Learning to detect malicious urls

J Ma, LK Saul, S Savage, GM Voelker - ACM Transactions on Intelligent …, 2011 - dl.acm.org
Malicious Web sites are a cornerstone of Internet criminal activities. The dangers of these
sites have created a demand for safeguards that protect end-users from visiting them. This …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Classifying illegal activities on tor network based on web textual contents

MW Al Nabki, E Fidalgo, E Alegre… - Proceedings of the 15th …, 2017 - aclanthology.org
The freedom of the Deep Web offers a safe place where people can express themselves
anonymously but they also can conduct illegal activities. In this paper, we present and make …

Detecting malicious URLs using machine learning techniques

F Vanhoenshoven, G Nápoles, R Falcon… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
The World Wide Web supports a wide range of criminal activities such as spam-advertised e-
commerce, financial fraud and malware dissemination. Although the precise motivations …

Dimmwitted: A study of main-memory statistical analytics

C Zhang, C Ré - arXiv preprint arXiv:1403.7550, 2014 - arxiv.org
We perform the first study of the tradeoff space of access methods and replication to support
statistical analytics using first-order methods executed in the main memory of a Non-Uniform …

Cost-sensitive online active learning with application to malicious URL detection

P Zhao, SCH Hoi - Proceedings of the 19th ACM SIGKDD international …, 2013 - dl.acm.org
Malicious Uniform Resource Locator (URL) detection is an important problem in web search
and mining, which plays a critical role in internet security. In literature, many existing studies …