Targeted Malicious Email (TME) has become more dangerous because it gathers user sensitive information. Beyond spam and phishing designed to trick users into revealing information, TME exploits computer networks and gathers sensitive information. It targets on single users and is designed to appear legitimate and trustworthy. Persistent threat features such as threat actor locale and weaponization tools along with recipient-oriented features such as reputation and role are leveraged with supervised data classification algorithms to demonstrate new techniques for detection of targeted malicious email. We propose a new email filtering technique using random forest classifier and Naïve Bayesian classification. A compromised router detection ...
Nowadays, Email spam is a major problem, with the increase usage of internet for product promotions,...
Nowadays, Email spam is a major problem, with the increase usage of internet for product promotions,...
This paper proposes to use the Naïve Bayes-based algorithm for phishing detection, specifically in s...
In the cutting edge time, all administrations are kept up with on the web and everybody go through i...
Sharing and storing of data in the web world is with the help of social networks. Messages are excha...
Embedding malicious URLs in e-mails is one of the most common web threats facing the internet commun...
Internet users are seriously endangered by phishing emails and keeping digital communication secure...
In this paper we propose a middleware infrastructure to address the problem of filtering unsolicitat...
The email threat landscape is constantly evolving and hence difficult to counteract even by carrier-...
Unethical e-mail senders bear little or no cost for mass distribution of messages, yet normal e-mail...
Abstract. Spam is serious problem that affects email users (e.g. phish-ing attacks, viruses and time...
As emails communications have no consistent authentication procedure to ensure the authenticity, we ...
This paper proposes an intelligent model for detection of phishing emails which depends on a preproc...
As emails communications have no consistent authentication procedure to ensure the authenticity, we ...
Phishing emails usually contain a message from a credible looking source requesting a user to click ...
Nowadays, Email spam is a major problem, with the increase usage of internet for product promotions,...
Nowadays, Email spam is a major problem, with the increase usage of internet for product promotions,...
This paper proposes to use the Naïve Bayes-based algorithm for phishing detection, specifically in s...
In the cutting edge time, all administrations are kept up with on the web and everybody go through i...
Sharing and storing of data in the web world is with the help of social networks. Messages are excha...
Embedding malicious URLs in e-mails is one of the most common web threats facing the internet commun...
Internet users are seriously endangered by phishing emails and keeping digital communication secure...
In this paper we propose a middleware infrastructure to address the problem of filtering unsolicitat...
The email threat landscape is constantly evolving and hence difficult to counteract even by carrier-...
Unethical e-mail senders bear little or no cost for mass distribution of messages, yet normal e-mail...
Abstract. Spam is serious problem that affects email users (e.g. phish-ing attacks, viruses and time...
As emails communications have no consistent authentication procedure to ensure the authenticity, we ...
This paper proposes an intelligent model for detection of phishing emails which depends on a preproc...
As emails communications have no consistent authentication procedure to ensure the authenticity, we ...
Phishing emails usually contain a message from a credible looking source requesting a user to click ...
Nowadays, Email spam is a major problem, with the increase usage of internet for product promotions,...
Nowadays, Email spam is a major problem, with the increase usage of internet for product promotions,...
This paper proposes to use the Naïve Bayes-based algorithm for phishing detection, specifically in s...