Phishing attacks are a major cybersecurity threat that resulted in over 1.2 million incidents in the first half of 2020. These attacks caused substantial financial losses and posed risks to individuals and organizatio...
详细信息
ISBN:
(数字)9798331534400
ISBN:
(纸本)9798331534417
Phishing attacks are a major cybersecurity threat that resulted in over 1.2 million incidents in the first half of 2020. These attacks caused substantial financial losses and posed risks to individuals and organizations. Being able to identify fraudulent websites is crucial in order to effectively address these potential risks. This study introduces a novel method for detecting phishing URLs by using word and character embeddings to capture complex URL patterns. We used a dataset of 80,000 URLs, including 50,000 legitimate ones and 30,000 phishing instances, and applied thorough preprocessing techniques. We utilized word embeddings in FastText to handle unseen words, with the added advantage of n-gram representations. Additionally, we captured character-level features through dense character embeddings. We trained several machine learning and deep learning models, and one model, the Convolutional Bidirectional LSTM (CBiLSTM), stood out with an accuracy of 99.01% and an F1-score of 99.08%. Furthermore, we made a thorough comparison with the most advanced techniques available, and our findings demonstrated clear superiority over previous research. This study presents an effective approach for classifying phishing URLs, providing a valuable tool to combat fraud and protect against identity theft, thereby helping to minimize the financial and emotional harm experienced by victims.
Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a cutting-edge concept for the sixth-generation (6G) wireless networks. In this paper, we propose a novel system that incorpo...
详细信息
When identifying facial expressions using a set of salient features, reversible neural network plays a crucial role. In order to create a prominent feature set, these salient features are extracted from a face image u...
详细信息
Failure in the rotor winding insulation of doubly-fed induction generators (DFIG) used in wind turbines is common due to the harsh environment and operating stresses. However, rotor insulation testing is difficult and...
Failure in the rotor winding insulation of doubly-fed induction generators (DFIG) used in wind turbines is common due to the harsh environment and operating stresses. However, rotor insulation testing is difficult and costly due to limited accessibility of wind generators installed inside the nacelle at remote locations. Therefore, remote and automated insulation testing can help reduce the maintenance cost and improve the reliability of DFIGs. In this paper, a new approach for testing the condition of rotor winding insulation for DFIGs is proposed. The main idea is to use the rotor-side inverter to perform off-line insulation testing whenever the wind generator is stopped. New test methods for partial discharge (PD), capacitance (C), and dissipation factor (DF) testing based on impulse and common mode voltage injection are proposed. Testing on a 6.3 kW wound rotor induction machine under emulated insulation defects is performed to verify that the proposed method can provide automated inverter-embedded testing for assessing the integrity of the DFIG rotor insulation.
The Internet of Things (IoT) connects numerous intelligent devices providing security features that interact with default settings accessed through applications. Additionally, Deep Learning (DL)-based mechanisms was i...
详细信息
Speech recognition plays a major role in technology that enables computers and devices to understand and interpret human speech, while speaker identification is a specialized application within speech recognition that...
Speech recognition plays a major role in technology that enables computers and devices to understand and interpret human speech, while speaker identification is a specialized application within speech recognition that focuses on recognizing and distinguishing individual speakers based on their unique vocal characteristics. By utilizing techniques such as feature extraction, pattern recognition and machine learning algorithms speaker identification systems can match an input speech sample to a known set of speaker profiles and determine the most likely speaker’s identity. This process involves comparing the extracted features of the input speech with the features stored in a database or model. In this project we are performing a comparative study which mainly focuses on extracting features through MFCC feature extraction for all models in common and then the implementation of identifying speakers using Gaussian Mixture Model, CNN, LSTM in case of RNN, k-Nearest Neighbour and a Random Forest Classifier.A comparative study on various types of models helps us to pave way on analyzing these to implement one of the best among these in day to day life. Among all the models, GMM performed very well with an accuracy of 98.68% followed by LSTM with an accuracy of 95.77%.
Evaluating the extent of motor impairment is an important aspect in Parkinson’s disease, where the Unified Parkinson’s Disease Rating Scale (UPDRS) plays a crucial role. The UPDRS assessment is traditional, time-con...
Evaluating the extent of motor impairment is an important aspect in Parkinson’s disease, where the Unified Parkinson’s Disease Rating Scale (UPDRS) plays a crucial role. The UPDRS assessment is traditional, time-consuming and labor intensive. This paper presents a stacked regression model using Light gradient-boosting machine (LightGBM) and CatBoost to automate and enhance UPDRS score predictions. It is an important advancement in managing Parkinson’s disease that provides more efficient and individualized care for patients through ensemble learning.
Aim of the paper is to conduct a survey of the present market, focusing on the best-selling retrofit LED lamps and to analyze experimentally their fundamental EMC performance for subsequent classification of the LED d...
详细信息
The security of mobile robotic networks (MRNs) has been an active research topic in recent years. This paper aims to secure the ubiquitous formation control of MRNs against the replacement attack, where an external ro...
详细信息
This technical summary outlines the use of Artificial Intelligence (AI) and Natural Language Processing (NLP) to beautify patron banking decision-making. AI-based banking systems can autonomously identify patterns in ...
详细信息
暂无评论