U radu "Detekcija zlonamjernih URL-ova" navode se problemi tradicionalnih me- toda detekcije zlonamjernih URL-ova te se bavi rješavanjem problema korištenjem me- toda strojnog učenja. Opisane su metode: stablo odlučivanja i slučajna šuma. Opisuje se korišteni skup podataka te način analize URL-a. Navedene metode implementirane su u programskom jeziku Python te su uspoređeni rezultati dobiveni na istom skupu podataka.The paper "Malicious URL detection" lists problems with traditional methods for detecting malicious URLs and explains usage of machine learning methods for mali- cious URL detection. Methods explained and used in this paper are: decision tree and random forest. The paper describes used dataset and URL analysis. Used methods are ...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
The World Wide Web has become an important part of our everyday life for information communication a...
The simplest approach to get sensitive information from unwitting people is through a phishing attac...
Tato práce shrnuje současný stav využití metod strojového učení v počítačové bezpečnosti. Prezentuje...
Sa sve većim brojem aktivnih web stranica rastu i kriminalne aktivnosti na Internetu. Napadači putem...
Abstract — Deceitful and malicious web sites pretense significant danger to desktop security, integr...
Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious...
Táto práca sa zaoberá problematikou škodlivého kódu na webe so zameraním na analýzu a detekciu škodl...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
The risk of network information insecurity is growing rapidly in number and level of risk is very hi...
Zlonamjerno ubačeni sadržaj pogađa velik broj sjedišta weba. U ovome radu opisan je specifičan tip z...
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. An attacker perfo...
Recently, with the increase in Internet usage, cybersecurity has been a significant challenge for co...
Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious...
Günümüzde yeni geliştirilen teknolojiler insan hayatını kolaylaştırmaktadır. Fakat internet ve siber...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
The World Wide Web has become an important part of our everyday life for information communication a...
The simplest approach to get sensitive information from unwitting people is through a phishing attac...
Tato práce shrnuje současný stav využití metod strojového učení v počítačové bezpečnosti. Prezentuje...
Sa sve većim brojem aktivnih web stranica rastu i kriminalne aktivnosti na Internetu. Napadači putem...
Abstract — Deceitful and malicious web sites pretense significant danger to desktop security, integr...
Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious...
Táto práca sa zaoberá problematikou škodlivého kódu na webe so zameraním na analýzu a detekciu škodl...
Security is a major concern on the Internet today. Phishing and malware attacks are amongst those th...
The risk of network information insecurity is growing rapidly in number and level of risk is very hi...
Zlonamjerno ubačeni sadržaj pogađa velik broj sjedišta weba. U ovome radu opisan je specifičan tip z...
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. An attacker perfo...
Recently, with the increase in Internet usage, cybersecurity has been a significant challenge for co...
Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious...
Günümüzde yeni geliştirilen teknolojiler insan hayatını kolaylaştırmaktadır. Fakat internet ve siber...
Malicious web sites pretendsignificant danger to desktop security and privacy.These links become ins...
The World Wide Web has become an important part of our everyday life for information communication a...
The simplest approach to get sensitive information from unwitting people is through a phishing attac...