In the optimization of intelligent network architecture, limited resources at each node, including edge computing devices, have posed challenges for deploying large models in performance-demanding scenarios. Knowledge...
详细信息
In the ever-evolving information age, the challenges posed by the exponential growth of data have led to innovative solutions that leverage the power of technology. This paper introduces a comprehensive data sharing p...
详细信息
The main insulation used in plastic underground cables is cross-linked polyethylene (XLPE). The XLPE underground cable which has been utilized in service for a long time, has experienced various stresses, or so-called...
详细信息
With the increasingly complex blockchain technology environment and emerging security threats, the detection and prevention of vulnerabilities in blockchain smart contracts have become crucial for ensuring the healthy...
详细信息
Forensic investigations rely heavily on the accurate detection and analysis of crime related objects present at crime scenes. Traditional methods of object detection often involve manual labor and are error prone proc...
详细信息
In today’s rapidly changing world, cloud service providers face numerous challenges in managing resources and meeting customer demands. To address these challenges, cloud service providers should prioritize the tasks...
详细信息
In this article, we propose a novel protocol that employs different technologies together, such as Software Defined Network (SDN) for the purpose of offering scalability, programmability, and global network informatio...
详细信息
Sarcasm is a type of communication that involves using words with meanings opposite to their literal definition to create humor or mock someone. This form of communication can be confusing as it often uses positive wo...
详细信息
Analyzing move-Layer layout procedures for satisfactory of provider (Qu 's) in Wi-Fi networks is of widespread importance to enhance network overall performance. Go-Layer optimization integrates distinct layers co...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in *** the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the *** this background,there is a drastic increase observed in the number of phishing emails sent to potential *** scenario necessitates the importance of designing an effective classification *** numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the *** current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)*** aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing *** the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word ***,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature ***,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing ***,the CS algorithm is used to fine-tune the parameters involved in the GRU *** performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several *** comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing *** proposed model achieved a maximum accuracy of 99.72%.
暂无评论