Author of the publication

USING BLACK-LIST AND WHITE-LIST TECHNIQUE TO DETECT MALICIOUS URLS

, , , , and . IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XII): 01-07 (December 2017)1 Hugh A. Chipman, Edward I. George, and Robert E. McCulloch. “Bayesian CART Model Search.” Journal of the American Statistical Association, Vol. 93(443), pp 935–948, September 1998. 2 Sujata Garera, Niels Provos, Monica Chew, and Aviel D. Rubin. “A framework for detection and measurement of phishing attacks.” In Proceedings of the 2007 ACM workshop on Recurring malicious code - WORM ’07, page 1, 2007. 3 Abhishek Gattani, AnHai Doan, Digvijay S. Lamba, NikeshGarera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, AnandRajaraman, and VenkyHarinarayan. “Entity extraction, linking, classifica- tion, and tagging for social media.” Proceedings of the VLDB Endowment, Vol. 6(11), pp 1126–1137, August 2013. 4 David D. Lewis. Naive (Bayes) at forty: The independence assumption in information retrieval. pages 4–15. 1998. 5 Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. “Learning to detect malicious URLs.” ACM Transactions on Intelligent Systems and Technology, Vol. 2(3), pp 1–24, April 2011. 6 FadiThabtah Maher Aburrous, M.A.Hossain, KeshavDahal. “Intelligent phishing detection system for e-banking using fuzzy data mining.” Expert Systems with Applications, Vol. 37(12), pp 7913–7921, Dec 2010. 7 AnkushMeshram and Christian Haas. “Anomaly Detection in Industrial. Networks using Machine Learning: A Roadmap.” In Machine Learning for Cyber Physical Systems, pages 65–72. Springer Berlin Heidelberg, Berlin, Heidelberg, 2017. 8 Xuequn Wang Nik Thompson,Tanya Jane McGill. “Security begins at home: Determinants of home computer and mobile device security behavior.” Computers & Security, Vol. 70, pp 376–391, Sep 2017. 9 Dan Steinberg and Phillip Colla. “CART: Classification and Regression Trees.” The Top Ten Algorithms in Data Mining, pp 179–201, 2009. 10 D. Teal. “Information security techniques including detection, interdiction and/or mitigation of memory injection attacks,” Google patents. Oct 2013. 11 Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. “Design and Evaluation of a Real-Time URL Spam Filtering Service.” In 2011 IEEE Symposium on Security and Privacy, pp 447–462. May 2011. 12 Sean Whalen, Nathaniel Boggs, and Salvatore J. Stolfo. “Model Aggregation for Distributed Content Anomaly Detection.” In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop - AISec ’14, pp 61–71, New York, USA, 2014. ACM Press. 13 Ying Yang and Geoffrey I. Webb. “Discretization for Naive-Bayes learning: managing a discretization bias and variance.” Machine Learning, Vol. 74(1), pp 39–74, Jan 2009..
DOI: 10.26562/IJIRIS.2017.DCIS10081

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-task Learning with Weak Class Labels: Leveraging iEEG to Detect Cortical Lesions in Cryptogenic Epilepsy., , , , , , and . MLHC, volume 56 of JMLR Workshop and Conference Proceedings, page 115-133. JMLR.org, (2016)A 12-electrode piezoelectric tube scanner for fast atomic force microscopy., , and . ACC, page 4957-4962. IEEE, (2010)Closing the Skills Gap in the Era of Industrial Digitalisation., , , and . ICPS, page 365-370. IEEE, (2020)Treatment of Alzheimer's, Cognitive, Chronic Pain Rehabilitation, Depression and Anxiety disorders in One System for Elderly Using VR., , , and . UR, page 483-488. IEEE, (2018)Rib Suppression for Enhancing Frontal Chest Radiographs Using Independent Component Analysis., , , , , and . ICANNGA (2), volume 4432 of Lecture Notes in Computer Science, page 300-308. Springer, (2007)Reliability analysis of normal strength CFST rectangular columns through multiple approaches., , , , and . Expert Syst. Appl., (2024)Crop monitoring using remote sensing land use and land change data: Comparative analysis of deep learning methods using pre-trained CNN models., , , , , , , , and . Big Data Res., (2024)Wetland identification through remote sensing: Insights into wetness, greenness, turbidity, temperature, and changing landscapes., , , , , , , , , and . Big Data Res., (2024)A method for realistic 3D projection mapping using multiple projectors., , , , , , , and . SIGGRAPH Posters, page 76:1-76:2. ACM, (2016)Realistic 3D projection mapping using polynomial texture maps., , , , , , , and . SIGGRAPH Posters, page 64:1-64:2. ACM, (2016)