Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical li...
详细信息
ISBN:
(纸本)9798350367904
Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical limitations in dealing with evolving tactics and new phishing schemes. Some of these approaches fail to cope with the temporal and visual patterns of phishing sites, which are crucial for timely and accurate detection. To overcome these difficulties, this work introduces a hybrid AI-based phishing website detection model that utilizes several machine learning and deep learning techniques to improve the accuracy of the detection and remove false positives. The proposed model uses LSTM networks, Genetic Algorithms, Random Forest, and CNN through the stacking ensemble framework. Since LSTM is adopted to capture the temporal dependencies in the website traffic and user interaction patterns, this model can effectively model their phishing behavior over time. GA is used for bioinspired feature selection to reduce the dimensionality of features while optimizing model performance. Random Forest is used as a base layer addressing structured features like URL characteristics and WHOIS information. CNNs are incorporated to extract feature content from a webpage and images that carry various visual indicators often used in phishing attacks including counterfeit logos or banners. A meta-classifier is then used to combine the outputs of LSTMs, CNN, and RF and generate the final classification to boost the detection rate. The proposed hybrid model surpasses the existing techniques and facilitates the analysis of temporal, visual, and structured data, making the detection considerably more accurate. Achieving accuracy of as much as 96-97% and having an AUC of 0.97 with a false positive rate below 3%, the model then impacts the more powerful and more flexible phishing detection system, which is then capable of being more protective against higher sophisticated phishing te
Agricultural industry has grown significantly bring sustainable farming practices in improving the food quality, enhancing agricultural productivity and global food security. However, the crop yield and its quality ar...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural net...
详细信息
Ransomware attacks pose a significant threat to critical infrastructures,demanding robust detection *** study introduces a hybrid model that combines vision transformer(ViT)and one-dimensional convolutional neural network(1DCNN)architectures to enhance ransomware detection *** common challenges in ransomware detection,particularly dataset class imbalance,the synthetic minority oversampling technique(SMOTE)is employed to generate synthetic samples for minority class,thereby improving detection *** integration of ViT and 1DCNN through feature fusion enables the model to capture both global contextual and local sequential features,resulting in comprehensive ransomware *** on the UNSW-NB15 dataset,the proposed ViT-1DCNN model achieved 98%detection accuracy with precision,recall,and F1-score metrics surpassing conventional *** approach not only reduces false positives and negatives but also offers scalability and robustness for real-world cybersecurity *** results demonstrate the model’s potential as an effective tool for proactive ransomware detection,especially in environments where evolving threats require adaptable and high-accuracy solutions.
The challenges stemming from crop diseases and a limited grasp of optimal fertilization practices have significantly burdened farmers, leading to reduced crop yields and a ripple effect of interconnected issues. This ...
详细信息
Phaseless imaging is a prominent field of study in many imaging modalities. In practical applications, the phaseless measurements usually contain noise and outliers, limiting the reconstruction algorithms' perform...
详细信息
Skin segmentation participates significantly in various biomedical applications,such as skin cancer identification and skin lesion *** paper presents a novel framework for segmenting the *** framework contains two mai...
详细信息
Skin segmentation participates significantly in various biomedical applications,such as skin cancer identification and skin lesion *** paper presents a novel framework for segmenting the *** framework contains two main stages:The first stage is for removing different types of noises from the dermoscopic images,such as hair,speckle,and impulse noise,and the second stage is for segmentation of the dermoscopic images using an attention residual U-shaped Network(U-Net).The framework uses variational Autoencoders(VAEs)for removing the hair noises,the Generative Adversarial Denoising Network(DGAN-Net),the Denoising U-shaped U-Net(D-U-NET),and Batch Renormalization U-Net(Br-U-NET)for remov-ing the speckle noise,and the Laplacian Vector Median Filter(MLVMF)for removing the impulse *** the second main stage,the residual attention u-net was used for *** framework achieves(35.11,31.26,27.01,and 26.16),(36.34,33.23,31.32,and 28.65),and(36.33,32.21,28.54,and 27.11)for removing hair,speckle,and impulse noise,respectively,based on Peak Signal Noise Ratio(PSNR)at the level of(0.1,0.25,0.5,and 0.75)of *** framework also achieves an accuracy of nearly 94.26 in the dice score in the process of segmentation before removing noise and 95.22 after removing different types of *** experiments have shown the efficiency of the used model in removing noise according to the structural similarity index measure(SSIM)and PSNR and in the segmentation process as well.
In the modern world of information and technology, the prime requirement is highly secure data communication against the cyber threat. Efficient data communication should support all principles of information security...
详细信息
Diabetes mellitus when untreated can result in a number of health issues. It is a metabolic disease marked by abnormal blood glucose levels. Early detection of diabetes improves a person's long-term health by halt...
详细信息
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to princip...
详细信息
ISBN:
(纸本)9798350328202
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to principally uphold the confirmation framework. Notwithstanding foundations regulating guaranteed about information straightforwardly, affiliations are also obliging them to examine the fingerprint endorsement. Despite establishments overseeing ensured about data, directly associations are similarly obliging them to research the fingerprint check. Organizations and foundations both are typically utilizing the idea of fingerprint for the participation and presence reason. Nevertheless, establishments presently managing secured information as like institutes and additionally going along with them to investigate the fingerprint authentication. More than this usual action there are some particular applications where the authentication would be considerable to help the application than using a traditional pattern of password. We proposed a fingerprint authentication system for the scientific based industry database access system. We removed the noise if any found in the input fingerprint using anisotropic Gauss filtering. The noise free fingerprint image is not further passed to the binarization phase as the need of binarization and some form of the drawback of binarization is replaced with a thinning algorithm. The thinned fingerprint image is followed by the matching process and once it is matched, then only the sensitive and highly confidential information are allowed to access from the database. The testing is done using OpenCV and FVC 2004 dataset to assess the projected retrieval method. Further the matched fingerprints are used to prove some of the internal structure properties of multi-granular rough sets (MGRS) on authenticated database fields. The accuracy obtained in this hybrid approach is found to be more satisfactory and hence the security towards acce
Nowadays, the widespread internet technology brings out rapid advancement in the use of videos for sharing huge amounts of secret data. Conversely, the privacy of transmitted digital content is jeopardized by digital ...
详细信息
暂无评论