Embedding malicious URLs in e-mails is one of the most common web threats facing the internet community today. Malicious URLs have been widely used to mount various cyber-attacks like spear phishing, pharming, phishing and malware. By falsely claiming to be a trustworthy entity, users are lured into clicking on these compromised links to divulge vital information such as usernames, passwords, or credit card details and unknowingly succumb to identity theft. Hence, the detection of malicious URLs in e-mails is very essential so as to help internet users implement safe practices and as well prevent them from becoming victims of fraud. This paper explores how malicious links in e-mails can be detected from the lexical and host-based features o...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
In recent times, we can see a massive increase in the number of devices that are being connected to ...
The rate of cybercrime is on the rise as more people embrace technology in their different spheres o...
Phishing is an internet attack that aims to get users sensitive information by fraud websites. Websi...
Malicious links are used as a source by the distribution channels to broadcast malware all over the ...
Targeted Malicious Email (TME) has become more dangerous because it gathers user sensitive informati...
Over the last few years, the Web has seen a massive growth in the number and kinds of web services. ...
Over the last few years, the Web has seen a massive growth in the number and kinds of web services. ...
Phishing is an act of cracking by single person or group of persons to stolen the personal confident...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
Abstract. This paper presents a system for classifying e-mails into two categories, legitimate and f...
10th Annual Computing and Communication Workshop and Conference, CCWC (2020 : Las Vegas, United Stat...
In this era of computer age, as more and more people use internet to carry out their day to day work...
Phishing is online security attack where attacker create replica of exiting web page for accessing u...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
In recent times, we can see a massive increase in the number of devices that are being connected to ...
The rate of cybercrime is on the rise as more people embrace technology in their different spheres o...
Phishing is an internet attack that aims to get users sensitive information by fraud websites. Websi...
Malicious links are used as a source by the distribution channels to broadcast malware all over the ...
Targeted Malicious Email (TME) has become more dangerous because it gathers user sensitive informati...
Over the last few years, the Web has seen a massive growth in the number and kinds of web services. ...
Over the last few years, the Web has seen a massive growth in the number and kinds of web services. ...
Phishing is an act of cracking by single person or group of persons to stolen the personal confident...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
Abstract. This paper presents a system for classifying e-mails into two categories, legitimate and f...
10th Annual Computing and Communication Workshop and Conference, CCWC (2020 : Las Vegas, United Stat...
In this era of computer age, as more and more people use internet to carry out their day to day work...
Phishing is online security attack where attacker create replica of exiting web page for accessing u...
Phishing is a common attack on credulous people by making them disclose their unique information. It...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
In recent times, we can see a massive increase in the number of devices that are being connected to ...