[PDF] Top 20 A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model
Has 10000 "A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model" found on our website. Below are the top 20 most common "A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model".
A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model
... LDA, Doc2Vec has low compu- tational complexity and can learn embedding vectors of every word rather than only get the distribution of topic ...classifiers, Doc2Vec results in very promising accuracy in ... See full document
13
A Multi Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing
... fake web page owned by attackers that looks very similar to a legitimate ...directed web page, it becomes available for attackers to access, and this is used to commit fraud and carry out ... See full document
14
PhishFind - An Enhanced Adaptive Neuro-Fuzzy Inference System Phishing Detection over Fog Networks
... the Phishing attacks over web medium.Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches ... See full document
13
Website Phishing Detection using Heuristic Based Approach
... distinguish phishing websites from legitimate ...‘‘legitimate’’. Based on the studies many new features are proposed by researchers recently but basically there are 27 features which are classified in 6 ... See full document
5
Mining Bilingual Data from the Web with Adaptively Learnt Patterns
... the Web can benefit many NLP applications, such as machine translation and cross language information re- ...paper, based on the observation that bilingual data in many web pages appear collectively ... See full document
9
Semantic Similarity Measure using Web Page Count, NGD and Snippet Based Method
... the web such as relation extraction, community mining, document clustering, and automatic metadata ...empirical method to estimate semantic similarity using page counts and text snippets ... See full document
12
SMS Phishing Detection Using Oversampling and Feature Optimization Method
... SMS phishing detection framework using oversampling and feature optimization method is presented through handling with imbalanced data problem and analyzing different types ...oversampling ... See full document
11
International Journal of Computer Science and Mobile Computing
... whenever using the mobile application part of the SS7 ...encoded using a variety of alphabets, the default GSM 7-bit alphabet, the 8-bit data alphabet, and the 16-bit UCS-2 ... See full document
5
Web page recommendation model for web personalization
... Fig. 2 shows the impact of using similarity together with confidence of the rules (ARsim) in generating recommendations. Even though traditional associations rule have defeat ARsim in precision, but ARsim is found ... See full document
7
A Method of Web Page Classification Based on Feature Dimension Reduction
... Bloom filter is the use of space superiority hash tables designed data structure by allowing a small number of errors to save a lot of storage space. The core of bloom filter algorithm is using multiple different ... See full document
5
An Iterative Link based Method for Parallel Web Page Mining
... parallel web pages from bi- lingual web sites is a crucial step of bi- lingual resource construction for cross- lingual information ...parallel web pages from bi- lingual web ...and ... See full document
9
FAKE WEBSITE DETECTION USING REGRESSION
... predict phishing websites, we implemented a flexible and effective system that is based on data mining ...The phishing website can be detected based on some important characteristics like URL, ... See full document
9
Designing a Model for Web Page Generation Using Repository of Templates
... presentation. Web engineering is neither a clone nor a subset of software engineering, although both involve programming and software ...if Web Engineering uses Software Engineering principles, it ... See full document
12
TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing
... Study showed that the attackers these days make use of user trust and fear to make their phishing attacks a success. The tabnabbing attack makes use of the same principle. The attacker keeps a watch on user’s ... See full document
7
A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients
... error method [12], empirical formu- la method [13], growth method [14], pruning method [15], adaptive increase and decrease algorithm [16], genetic algorithm [17], ...error method is a ... See full document
14
Anti-phishing as a web-based user service
... the web for published email ...posts, web forums, mailing lists and guest books, since these resources are likely to contain email addresses (Hird, ...dictionary- based address ...themselves, ... See full document
9
DETECTION OF PHISHING PAGES OVER THE INTERNET USING ANTI-PHISHING TECHNIQUES
... Engin Kirda et.al have proposed a work on Protecting Users Against Phishing Attacks [5]. They have used a browser extension called AntiPhish to protect the users from phishing attacks. They have taken ... See full document
8
Predicate based Algorithm for Malicious Web Page Detection using Genetic Fuzzy Systems and Support Vector Machine
... Web page requires largest security concern in the ...a web site with numerous links and hyperlinks. Web pages may contain multimedia, images, videos and ...A web site is a collection of ... See full document
7
Phishing page detection via learning classifiers from page layout feature
... detects phishing pages based on “term frequency-inverse docu- ment frequency ...rendered page to extract page infor- ...the page content is consistent with its domain and thus ... See full document
14
Web Document Segmentation for Better Extraction of Information: A Review
... the DOM (Document Object Model) structure of the HTML page, either by rendering and visual layout analysis or by interpreting or learning the meaning and importance of tag structures in some ... See full document
5
Related subjects