[PDF][PDF] Real-time phishing detection using deep learning methods by extensions

DM Linh, HD Hung, HM Chau, QS Vu… - International Journal of …, 2024 - researchgate.net
Phishing is an attack method that relies on a user's insufficient vigilance and understanding
of the internet. For example, an attacker creates an online transaction website and tricks …

[PDF][PDF] Malicious attacks modelling: a prevention approach for ad hoc network security

HA Talib, RB Alothman… - Indonesian Journal of …, 2023 - academia.edu
As a result of the expansions that have taken place in the field of networking and the
increase in the number of users of networks, there have recently been breakthroughs made …

[HTML][HTML] L2R-MLP: A Multilabel Classification Scheme for the Detection of DNS Tunneling

EO Asani, MO Ayoola, ET Aderemi… - Data Science and …, 2024 - Elsevier
Abstract Domain name system (DNS) tunneling attacks can bypass firewalls, which typically"
trust" DNS transmissions by concealing malicious traffic in the packets trusted to convey …

Triple Watermarking Scheme for Digital Images

EO Asani, M Gbenga-Degun, SA Ajagbe… - Journal of Hunan …, 2023 - jonuns.com
Digital watermarking of text, image, and video data has become an indispensable strategy
for the authentication, validation, and ultimate protection of digital content. This study aims to …

Shannon entropy on near-infrared spectroscopy for nondestructively determining water content in oil palm

I Novianty, W Sholihah, GP Mindara… - … Journal of Electrical …, 2023 - repository.uki.ac.id
Indonesia is the world's largest producer of palm oil. To preserve its competitive advantages,
the Indonesian oil palm sector must expand high-quality palm oil output. In oil palm quality …

A server-side phishing detection api using long-short term memory (lstm) and multi-layer perceptron (mlp)

EO Asani, OS Babalola, AE Akinola… - … and Business for …, 2024 - ieeexplore.ieee.org
The objective of this study was to develop an application programming interface (API) for the
detection of phishing attacks. The API harnesses the capabilities of two advanced machine …

Influence of Protection Motivation Theory on Information Security Practices: The Case of Ghanaian Mobile Banking Merchants

P Danquah, H Matey, K Asiamah - Journal of Applied Science and …, 2024 - csirjasit.org
The mobile banking industry has grown to become Ghana's most popular digital financial
service (DFS). Since its inception in 2018, the first interoperable system in Africa has …

[PDF][PDF] Journal Homepage:-www. journalijar. com

JC Cardona - 2024 - researchgate.net
Today's world has led people to more frequent digital engagements and activities. With a
few taps on the screen, one can shop from digital stores, book a ride to avoid the hassle of …

Comparative Analysis of Feature Selection Methods for Software Bug Classification

BA Orenyi, OO Tolulope, AE Tobi - … International Conference on …, 2024 - ieeexplore.ieee.org
Software bug classification is a critical task in software engineering aimed at identifying
defects early to improve software quality and reliability. Despite its importance, effectively …

Detection of Phishing Emails using Support Vector Classifier and Gaussian Latent Variable Model

EO Asani, VO Adedayo-Ajayi… - … and Business for …, 2024 - ieeexplore.ieee.org
The explosive growth of internet technologies has transformed online interactions, but it has
also increased security risks. Phishing is a serious problem that involves the surreptitious …