SeizeMaliciousURL: A novel learning approach to detect malicious URLs

[1]  Ali A. Ghorbani,et al.  Detecting Malicious URLs Using Lexical Analysis , 2016, NSS.

[2]  Farnam Jahanian,et al.  Shades of grey: On the effectiveness of reputation-based “blacklists” , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[3]  Barbara Carminati,et al.  A deep learning model for Twitter spam detection , 2020, Online Soc. Networks Media.

[4]  Barbara Carminati,et al.  Helping Users Managing Context-Based Privacy Preferences , 2019, 2019 IEEE International Conference on Services Computing (SCC).

[5]  Thomas G. Dietterich Overfitting and undercomputing in machine learning , 1995, CSUR.

[6]  Maulahikmah Galinium,et al.  Automated document classification for news article in Bahasa Indonesia based on term frequency inverse document frequency (TF-IDF) approach , 2014, 2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE).

[7]  Masahiro Kuyama,et al.  Method for Detecting a Malicious Domain by Using WHOIS and DNS Features , 2016 .

[8]  K. P. Soman,et al.  Evaluating deep learning approaches to characterize and classify malicious URL's , 2018, J. Intell. Fuzzy Syst..

[9]  Nour Moustafa,et al.  Identification of malicious activities in industrial internet of things based on deep learning models , 2018, J. Inf. Secur. Appl..

[10]  Isha Sharma,et al.  PhishSKaPe: A Content based Approach to Escape Phishing Attacks , 2020 .

[11]  Asif Iqbal Hajamydeen,et al.  Detecting Phishing Website Using Machine Learning , 2020, 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA).

[12]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[13]  Mohammad Abdul Azim,et al.  Knapsack graph-based privacy checking for smart environments , 2021, Comput. Secur..

[14]  Prabaharan Poornachandran,et al.  A lexical approach for classifying malicious URLs , 2015, 2015 International Conference on High Performance Computing & Simulation (HPCS).

[15]  Bo Li,et al.  Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach , 2017, Comput. Secur..

[16]  Barbara Carminati,et al.  A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper) , 2016, 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI).

[17]  Benjamin Livshits,et al.  Rozzle: De-cloaking Internet Malware , 2012, 2012 IEEE Symposium on Security and Privacy.

[18]  Hadis Karimipour,et al.  Cyber intrusion detection by combined feature selection algorithm , 2019, J. Inf. Secur. Appl..

[19]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[20]  Chia-Mei Chen,et al.  Efficient suspicious URL filtering based on reputation , 2015, J. Inf. Secur. Appl..

[21]  Seong Oun Hwang,et al.  PhishHaven—An Efficient Real-Time AI Phishing URLs Detection System , 2020, IEEE Access.

[22]  Youssef Iraqi,et al.  Phishing Detection: A Literature Survey , 2013, IEEE Communications Surveys & Tutorials.

[23]  Barbara Carminati,et al.  Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications , 2019, IEEE Transactions on Dependable and Secure Computing.

[24]  Gavin Brown,et al.  Ensemble Learning , 2010, Encyclopedia of Machine Learning and Data Mining.

[25]  Barbara Carminati,et al.  Learning Privacy Habits of PDS Owners , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[26]  Banu Diri,et al.  Machine learning based phishing detection from URLs , 2019, Expert Syst. Appl..

[27]  Mohammad Sohel Rahman,et al.  An ensemble learning based approach for impression fraud detection in mobile advertising , 2018, J. Netw. Comput. Appl..

[28]  Lawrence K. Saul,et al.  Identifying suspicious URLs: an application of large-scale online learning , 2009, ICML '09.

[29]  Barbara Carminati,et al.  Detecting Spam Accounts on Twitter , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[30]  Fabio A. González,et al.  Classifying phishing URLs using recurrent neural networks , 2017, 2017 APWG Symposium on Electronic Crime Research (eCrime).

[31]  Alwyn R. Pais,et al.  CatchPhish: detection of phishing websites by inspecting URLs , 2020, J. Ambient Intell. Humaniz. Comput..

[32]  Tie Li,et al.  Improving malicious URLs detection via feature engineering: Linear and nonlinear space transformation methods , 2020, Inf. Syst..