Author of the publication

A proactive discovery and filtering solution on phishing websites.

, , , , and . IEEE BigData, page 2348-2355. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 1-11. Springer, (2020)A proactive discovery and filtering solution on phishing websites., , , , and . IEEE BigData, page 2348-2355. IEEE Computer Society, (2015)A Worm Behavioral Approach to Susceptible Host Detection., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 77-83. Springer, (2005)A novel classification model of collective user web behaviour based on network traffic contents., , , and . IET Networks, 10 (4): 173-184 (2021)Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network., , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 1843-1854 (February 2023)Research on Webpage Similarity Computing Technology Based on Visual Blocks., , , and . SMP, volume 489 of Communications in Computer and Information Science, page 187-197. Springer, (2014)A comprehensive analytical model of user influence in the social networks., , , and . Int. J. Wirel. Mob. Comput., 17 (2): 142-148 (2019)GNN-based Advanced Feature Integration for ICS Anomaly Detection., , , , , and . ACM Trans. Intell. Syst. Technol., 14 (6): 106:1-106:32 (December 2023)A Deep Learning Approach to Detect Anomaly in Software-Defined Network., , , , , and . ICAIT, page 100-106. IEEE, (2020)A Content Auditing Method of IPsec VPN., , , , and . DSC, page 634-639. IEEE, (2018)