In response to the evolving aspect of emerging phishing threats, this paper presents a comprehensive study of machine learning techniques used for detecting phishing attacks. In this process, we investigate and explor...
详细信息
ISBN:
(数字)9798331509934
ISBN:
(纸本)9798331509941
In response to the evolving aspect of emerging phishing threats, this paper presents a comprehensive study of machine learning techniques used for detecting phishing attacks. In this process, we investigate and explore the various stages of phishing attacks, highlighting the techniques and strategies used by attackers. In addition, existing detection methods are catego-rized and concisely reviewed. To ensure the applicability of our findings in real-life scenarios, simulations are performed using two comprehensive real-world datasets. Moreover, the detection mechanism is implemented using several advanced machine-learning models, including state-of-the-art Natural Language Processing (NLP). The study also bottom-lines the significance of feature engineering in improving model performance. Our contributions will help safeguarding cyberspace through the use of machine learning technologies.
Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However,there is no standard guideline for data transformation from relationa...
详细信息
Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However,there is no standard guideline for data transformation from relational database toNoSQL database. A number of schema transformation techniques have been proposed to improve data transformation process and resulted better query processingtime when compared to the relational database query processing time. However,these approaches produced redundant tables in the resulted schema that in turnconsume large unnecessary storage size and produce high query processing timedue to the generated schema with redundant column families in the transformedcolumn-oriented database. In this paper, an efficient data transformation techniquefrom relational database to column-oriented database is proposed. The proposedschema transformation technique is based on the combination of denormalizationapproach, data access pattern and multiple-nested schema. In order to validate theproposed work, the proposed technique is implemented by transforming data fromMySQL database to MongoDB database. A benchmark transformation techniqueis also performed in which the query processing time and the storage size arecompared. Based on the experimental results, the proposed transformation technique showed significant improvement in terms query processing time and storagespace usage due to the reduced number of column families in the column-orienteddatabase.
This paper presents a ventilator that is characterized by simple construction and operation, as well as accurate execution of tasks due to the control system based on the Arduino board and servo motor. The device pres...
详细信息
The number of phishing websites is increasing, and the methods used to direct users to these sites are becoming more diverse. As web push notifications become more widespread, adversaries have begun using them as a me...
详细信息
ISBN:
(数字)9798331540289
ISBN:
(纸本)9798331540296
The number of phishing websites is increasing, and the methods used to direct users to these sites are becoming more diverse. As web push notifications become more widespread, adversaries have begun using them as a method to direct users to phishing websites, known as phishing web push notifications. While protection against other phishing methods has been widely studied, countermeasures against phishing web push notifications remain an ongoing research topic. In this paper, we explore a method to control the display of web push notifications to protect users from phishing attempts. To minimize the cost of implementing and introducing the control mechanism, we utilized a browser extension to manage the display of web push notifications. We employed a keyword-based approach to detect and prevent the display of suspicious web push notifications. Our experimental results demonstrated that the proposed method effectively blocks phishing notifications.
Floods are natural disasters that are very difficult to predict and come from a variety of factors. One of the causes of flooding is an increase in the amount of water discharge. The water discharge comes from various...
详细信息
This research presents a novel electromagnetic-based sensor for inline measurement of unmilled rice paddy moisture content in the rice mill factory. The proposed sensor has been designed based on the modified planar d...
详细信息
This research endeavors to design a predictive model to forecast stock prices using a Gradient Boosting Machine (GBM) regressor, specifically emphasizing the adjusted closing price to mitigate the autocorrelation issu...
详细信息
Natural language is any language that a person uses or speaks, such as Hindi, English, French, Marathi, Bengali, Gujrati, and so *** can better comprehend, interpret, and manipulate human language with the help of the...
详细信息
We present a time-dependent approach for learning potential features that may explain the early risk of human self-harm. Rather than only extracting features from text posted by users, as suggested by several approach...
详细信息
In this contribution, we improve of the performance of the Rectified Linear Unit Memristor Like Activation Function with the implication to help training process of CNN without a lot of epochs by computing the best va...
详细信息
暂无评论