Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical li...
详细信息
ISBN:
(纸本)9798350367904
Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical limitations in dealing with evolving tactics and new phishing schemes. Some of these approaches fail to cope with the temporal and visual patterns of phishing sites, which are crucial for timely and accurate detection. To overcome these difficulties, this work introduces a hybrid AI-based phishing website detection model that utilizes several machine learning and deep learning techniques to improve the accuracy of the detection and remove false positives. The proposed model uses LSTM networks, Genetic Algorithms, Random Forest, and CNN through the stacking ensemble framework. Since LSTM is adopted to capture the temporal dependencies in the website traffic and user interaction patterns, this model can effectively model their phishing behavior over time. GA is used for bioinspired feature selection to reduce the dimensionality of features while optimizing model performance. Random Forest is used as a base layer addressing structured features like URL characteristics and WHOIS information. CNNs are incorporated to extract feature content from a webpage and images that carry various visual indicators often used in phishing attacks including counterfeit logos or banners. A meta-classifier is then used to combine the outputs of LSTMs, CNN, and RF and generate the final classification to boost the detection rate. The proposed hybrid model surpasses the existing techniques and facilitates the analysis of temporal, visual, and structured data, making the detection considerably more accurate. Achieving accuracy of as much as 96-97% and having an AUC of 0.97 with a false positive rate below 3%, the model then impacts the more powerful and more flexible phishing detection system, which is then capable of being more protective against higher sophisticated phishing te
Polymerization-induced self-assembly(PISA)combines synthesis and self-assembly of artificial polymers in one-pot,which brings us one step closer to emulating ***,the reported PISA formulations primarily focus on devel...
详细信息
Polymerization-induced self-assembly(PISA)combines synthesis and self-assembly of artificial polymers in one-pot,which brings us one step closer to emulating ***,the reported PISA formulations primarily focus on developing nano-objects with new chemical compositions and rarely on structural regulation of polymers with specific ***,sequence structure controllable polymerization-induced self-assembly(SCPISA)is reported by using 7-(2-methacryloyloxyethoxy)-4-methylcoumarin(CMA)as a *** the copolymerization of 2-hydroxyethyl methacrylate(HEMA)and CMA,controlled incorporation of CMA units into the polymer chains can be realized by programmable light/heat ***-based P(HEMA-co-CMA)copolymers with the same composition but different sequence structures generate a range of ***,the morphologies of the resultant nano-objects can also be controlled by regulating the feed molar ratio of CMA and HEMA,which is similar to the conventional PISA,but the synthesis procedure is obviously simplified in *** versatility of the methodology is further demonstrated by the fabrication of different functional nano-objects with sequence structure-dependent morphologies in SCPISA systems with different functional monomers.
This article develops a novel data-driven safe Q-learning method to design the safe optimal controller which can guarantee constrained states of nonlinear systems always stay in the safe region while providing an opti...
详细信息
This article develops a novel data-driven safe Q-learning method to design the safe optimal controller which can guarantee constrained states of nonlinear systems always stay in the safe region while providing an optimal ***,we design an augmented utility function consisting of an adjustable positive definite control obstacle function and a quadratic form of the next state to ensure the safety and ***,by exploiting a pre-designed admissible policy for initialization,an off-policy stabilizing value iteration Q-learning(SVIQL)algorithm is presented to seek the safe optimal policy by using offline data within the safe region rather than the mathematical ***,the monotonicity,safety,and optimality of the SVIQL algorithm are theoretically *** obtain the initial admissible policy for SVIQL,an offline VIQL algorithm with zero initialization is constructed and a new admissibility criterion is established for immature iterative ***,the critic and action networks with precise approximation ability are established to promote the operation of VIQL and SVIQL ***,three simulation experiments are conducted to demonstrate the virtue and superiority of the developed safe Q-learning method.
The innovative system outlined in the provided research demonstrates a significant stride towards addressing the growing concern of road safety. Lane departure and driver drowsiness are two major causes of road accide...
详细信息
In this paper, we study the task of generating financial news articles related to stock price fluctuations. Traditionally, reporters manually write these articles by identifying the causes behind significant stock pri...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its *** current WMC solvers work on Conjunctive Normal Form(CNF)***,CNF is not a natural representation for human-being in many *** by the stronger expressive power of Pseudo-Boolean(PB)formulas than CNF,we propose to perform WMC on PB *** on a recent dynamic programming algorithm framework called ADDMC for WMC,we implement a weighted PB counting tool *** compare PBCounter with the state-of-the-art weighted model counters SharpSAT-TD,ExactMC,D4,and ADDMC,where the latter tools work on CNF with encoding methods that convert PB constraints into a CNF *** experiments on three domains of benchmarks show that PBCounter is superior to the model counters on CNF formulas.
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast...
详细信息
Advances in medical science have led to a better understanding of Alzheimer's disease (AD), as shown by the clear description of AD using numerical, medical and MRI architectural imagery details. Early diagnosis o...
详细信息
Dynamical systems often exhibit multiple attractors representing significantly different functioning conditions.A global map of attraction basins can offer valuable guidance for stabilizing or transitioning system ***...
详细信息
Dynamical systems often exhibit multiple attractors representing significantly different functioning conditions.A global map of attraction basins can offer valuable guidance for stabilizing or transitioning system *** a map can be constructed without prior system knowledge by identifying attractors across a sufficient number of points in the state ***,determining the attractor for each initial state can be a laborious ***,we tackle the challenge of reconstructing attraction basins using as few initial points as *** each iteration of our approach,informative points are selected through random seeding and are driven along the current classification boundary,promoting the eventual selection of points that are both diverse and *** results across various experimental dynamical systems demonstrate that our approach requires fewer points than baseline methods while achieving comparable mapping ***,the reconstructed map allows us to accurately estimate the minimum escape distance required to transition the system state to a target basin.
Authentication in modern era, has evolved significantly to address the increasing complexity and security challenges of our digital world. Traditional methods of authentication, such as passwords and PINS have proven ...
详细信息
暂无评论