• No results found

[PDF] Top 20 A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model

Has 10000 "A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model" found on our website. Below are the top 20 most common "A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model".

A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model

A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model

... LDA, Doc2Vec has low compu- tational complexity and can learn embedding vectors of every word rather than only get the distribution of topic ...classifiers, Doc2Vec results in very promising accuracy in ... See full document

13

A Multi Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing

A Multi Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing

... fake web page owned by attackers that looks very similar to a legitimate ...directed web page, it becomes available for attackers to access, and this is used to commit fraud and carry out ... See full document

14

PhishFind - An Enhanced Adaptive Neuro-Fuzzy Inference System Phishing Detection over Fog Networks

PhishFind - An Enhanced Adaptive Neuro-Fuzzy Inference System Phishing Detection over Fog Networks

... the Phishing attacks over web medium.Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches ... See full document

13

Website Phishing Detection using Heuristic Based Approach

Website Phishing Detection using Heuristic Based Approach

... distinguish phishing websites from legitimate ...‘‘legitimate’’. Based on the studies many new features are proposed by researchers recently but basically there are 27 features which are classified in 6 ... See full document

5

Mining Bilingual Data from the Web with Adaptively Learnt Patterns

Mining Bilingual Data from the Web with Adaptively Learnt Patterns

... the Web can benefit many NLP applications, such as machine translation and cross language information re- ...paper, based on the observation that bilingual data in many web pages appear collectively ... See full document

9

Semantic Similarity Measure using Web Page Count, NGD and Snippet Based Method

Semantic Similarity Measure using Web Page Count, NGD and Snippet Based Method

... the web such as relation extraction, community mining, document clustering, and automatic metadata ...empirical method to estimate semantic similarity using page counts and text snippets ... See full document

12

SMS Phishing Detection Using Oversampling and Feature Optimization Method

SMS Phishing Detection Using Oversampling and Feature Optimization Method

... SMS phishing detection framework using oversampling and feature optimization method is presented through handling with imbalanced data problem and analyzing different types ...oversampling ... See full document

11

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... whenever using the mobile application part of the SS7 ...encoded using a variety of alphabets, the default GSM 7-bit alphabet, the 8-bit data alphabet, and the 16-bit UCS-2 ... See full document

5

Web page recommendation model for web personalization

Web page recommendation model for web personalization

... Fig. 2 shows the impact of using similarity together with confidence of the rules (ARsim) in generating recommendations. Even though traditional associations rule have defeat ARsim in precision, but ARsim is found ... See full document

7

A Method of Web Page Classification Based on Feature Dimension Reduction

A Method of Web Page Classification Based on Feature Dimension Reduction

... Bloom filter is the use of space superiority hash tables designed data structure by allowing a small number of errors to save a lot of storage space. The core of bloom filter algorithm is using multiple different ... See full document

5

An Iterative Link based Method for Parallel Web Page Mining

An Iterative Link based Method for Parallel Web Page Mining

... parallel web pages from bi- lingual web sites is a crucial step of bi- lingual resource construction for cross- lingual information ...parallel web pages from bi- lingual web ...and ... See full document

9

FAKE WEBSITE DETECTION USING REGRESSION

FAKE WEBSITE DETECTION USING REGRESSION

... predict phishing websites, we implemented a flexible and effective system that is based on data mining ...The phishing website can be detected based on some important characteristics like URL, ... See full document

9

Designing a Model for Web Page Generation Using Repository of Templates

Designing a Model for Web Page Generation Using Repository of Templates

... presentation. Web engineering is neither a clone nor a subset of software engineering, although both involve programming and software ...if Web Engineering uses Software Engineering principles, it ... See full document

12

TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing

TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing

... Study showed that the attackers these days make use of user trust and fear to make their phishing attacks a success. The tabnabbing attack makes use of the same principle. The attacker keeps a watch on user’s ... See full document

7

A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients

A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients

... error method [12], empirical formu- la method [13], growth method [14], pruning method [15], adaptive increase and decrease algorithm [16], genetic algorithm [17], ...error method is a ... See full document

14

Anti-phishing as a web-based user service

Anti-phishing as a web-based user service

... the web for published email ...posts, web forums, mailing lists and guest books, since these resources are likely to contain email addresses (Hird, ...dictionary- based address ...themselves, ... See full document

9

DETECTION OF PHISHING PAGES OVER THE INTERNET USING ANTI-PHISHING TECHNIQUES

DETECTION OF PHISHING PAGES OVER THE INTERNET USING ANTI-PHISHING TECHNIQUES

... Engin Kirda et.al have proposed a work on Protecting Users Against Phishing Attacks [5]. They have used a browser extension called AntiPhish to protect the users from phishing attacks. They have taken ... See full document

8

Predicate based Algorithm for Malicious Web Page Detection using Genetic Fuzzy Systems and Support Vector Machine

Predicate based Algorithm for Malicious Web Page Detection using Genetic Fuzzy Systems and Support Vector Machine

... Web page requires largest security concern in the ...a web site with numerous links and hyperlinks. Web pages may contain multimedia, images, videos and ...A web site is a collection of ... See full document

7

Phishing page detection via learning classifiers from page layout feature

Phishing page detection via learning classifiers from page layout feature

... detects phishing pages based on “term frequency-inverse docu- ment frequency ...rendered page to extract page infor- ...the page content is consistent with its domain and thus ... See full document

14

Web Document Segmentation for Better Extraction of Information: A Review

Web Document Segmentation for Better Extraction of Information: A Review

... the DOM (Document Object Model) structure of the HTML page, either by rendering and visual layout analysis or by interpreting or learning the meaning and importance of tag structures in some ... See full document

5

Show all 10000 documents...