Günümüzde yeni geliştirilen teknolojiler insan hayatını kolaylaştırmaktadır. Fakat internet ve siber âlem siber saldırılara açık bir ortamdır. URL'ler saldırı için kullanılan temel araçlardan bir tanesidir. Kötü niyetli URL'ler phishing, spam, finansal dolandırıcılık ve malware gibi pek çok internet suç aktivitesi için temel bir mekanizmadır. İnternetteki kötü niyetli URL'leri etkili bir şekilde tespit etmek ve sınıflandırmak amacıyla araştırmacılar tarafından kara liste hizmetleri geliştirilmiştir. Kötü niyetli URL'leri kara listeye almak hem kötü niyetli URL'nin hem de yeni oluşturulan URL'nin varyasyonlarını bulmakta tamamen etkili olmadığı için bu durum sorunun yalnızca bir kısmını çözmektedir. Devamlı güncelleme yapılması gerektiği içi...
Given the continuous growth of illicit activities on the Internet, there is a need for intelligent s...
Recently, with the increase in Internet usage, cybersecurity has been a significant challenge for co...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Considerable progress has been achieved in the digital domain, particularly in the online realm wher...
Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts have been used as wea...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
The risk of network information insecurity is growing rapidly in number and level of risk is very hi...
Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a form of ...
Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a form of ...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
The World Wide Web has become an important part of our everyday life for information communication a...
Tato práce shrnuje současný stav využití metod strojového učení v počítačové bezpečnosti. Prezentuje...
Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
Over the last few years, the Web has seen a massive growth in the number and kinds of web services. ...
Given the continuous growth of illicit activities on the Internet, there is a need for intelligent s...
Recently, with the increase in Internet usage, cybersecurity has been a significant challenge for co...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Considerable progress has been achieved in the digital domain, particularly in the online realm wher...
Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts have been used as wea...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
The risk of network information insecurity is growing rapidly in number and level of risk is very hi...
Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a form of ...
Recently, phishing attacks have been a crucial threat to cyberspace security. Phishing is a form of ...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
The World Wide Web has become an important part of our everyday life for information communication a...
Tato práce shrnuje současný stav využití metod strojového učení v počítačové bezpečnosti. Prezentuje...
Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
Over the last few years, the Web has seen a massive growth in the number and kinds of web services. ...
Given the continuous growth of illicit activities on the Internet, there is a need for intelligent s...
Recently, with the increase in Internet usage, cybersecurity has been a significant challenge for co...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...