NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 282
21.
Full text
22.
  • DeNNeS: deep embedded neura... DeNNeS: deep embedded neural network expert system for detecting cyber attacks
    Mahdavifar, Samaneh; Ghorbani, Ali A. Neural computing & applications, 09/2020, Volume: 32, Issue: 18
    Journal Article
    Peer reviewed

    With the advances in computing powers and increasing volumes of data, deep learning’s emergence has helped revitalize artificial intelligence research. There is a growing trend of applying deep ...
Full text
23.
  • Binary Hunter–Prey Optimiza... Binary Hunter–Prey Optimization with Machine Learning—Based Cybersecurity Solution on Internet of Things Environment
    Khadidos, Adil O.; AlKubaisy, Zenah Mahmoud; Khadidos, Alaa O. ... Sensors (Basel, Switzerland), 08/2023, Volume: 23, Issue: 16
    Journal Article
    Peer reviewed
    Open access

    Internet of Things (IoT) enables day-to-day objects to connect with the Internet and transmit and receive data for meaningful purposes. Recently, IoT has resulted in many revolutions in all sectors. ...
Full text
24.
  • Securix: a 3D game-based le... Securix: a 3D game-based learning approach for phishing attack awareness
    Onashoga, Adebukola S.; Ojo, Oluwafolake E.; Soyombo, Oluwadamilola O. Journal of cyber security, 20/4/3/, Volume: 3, Issue: 2
    Journal Article
    Peer reviewed

    Majority of Internet users lack anti-phishing skills in identifying a phishing attack. This paper introduces a 3D-game prototype named Securix which simplifies and exaggerates real life scenario and ...
Full text
25.
  • A performance analysis of S... A performance analysis of Software Defined Network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA)
    S., Edwin Raja; Ravi, R. Computer communications, 03/2020, Volume: 153
    Journal Article
    Peer reviewed

    This paper discusses a novel frame work approach of Software Defined Network based prevention on phishing attack with the help of the deep machine learning with CANTINA approach (DMLCA) in the ...
Full text
26.
  • Intelligent rule-based phis... Intelligent rule-based phishing websites classification
    Mohammad, Rami M; Thabtah, Fadi; McCluskey, Lee IET information security, 20/May , Volume: 8, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Phishing is described as the art of echoing a website of a creditable firm intending to grab user's private information such as usernames, passwords and social security number. Phishing websites ...
Full text

PDF
27.
  • An efficient phishing webpa... An efficient phishing webpage detector
    He, Mingxing; Horng, Shi-Jinn; Fan, Pingzhi ... Expert systems with applications, 09/2011, Volume: 38, Issue: 10
    Journal Article
    Peer reviewed

    ► A heuristic method is proposed to determine if a webpage is legal. ► The method can detect new phishing pages which feature based tools could not. ► Based on SVM, the proposed method is efficient ...
Full text
28.
Full text
29.
  • Machine Learning-Based Phis... Machine Learning-Based Phishing Attack Detection
    Hossain, Sohrab; Sarma, Dhiman; Chakma, Rana Joyti International journal of advanced computer science & applications, 2020, Volume: 11, Issue: 9
    Journal Article
    Open access

    This paper explores machine learning techniques and evaluates their performances when trained to perform against datasets consisting of features that can differentiate between a Phishing Website and ...
Full text

PDF
30.
  • Nscanner: Vulnerabilities D... Nscanner: Vulnerabilities Detection Tool for Web Application
    Surian, R. Utaya; Rahman, Nor Azlina Abd; Nathan, Yogeswaran Journal of physics. Conference series, 12/2020, Volume: 1712, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Internet has been dominating the world nearly a decade. Web application is known to be the most widespread platform of the internet especially when it comes to share resources, e-commerce services, ...
Full text

PDF
1 2 3 4 5
hits: 282

Load filters