Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access

    ARTICLE

    A Filter-Based Feature Selection Framework to Detect Phishing URLs Using Stacking Ensemble Machine Learning

    Nimra Bari1, Tahir Saleem2, Munam Shah3, Abdulmohsen Algarni4, Asma Patel5,*, Insaf Ullah6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1167-1187, 2025, DOI:10.32604/cmes.2025.070311 - 30 October 2025

    Abstract Today, phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers, passwords, and usernames. We can find several anti-phishing solutions, such as heuristic detection, virtual similarity detection, black and white lists, and machine learning (ML). However, phishing attempts remain a problem, and establishing an effective anti-phishing strategy is a work in progress. Furthermore, while most anti-phishing solutions achieve the highest levels of accuracy on a given dataset, their methods suffer from an increased number of false positives. These methods are ineffective against zero-hour attacks. Phishing sites with… More >

  • Open Access

    ARTICLE

    URLLC Service in UAV Rate-Splitting Multiple Access: Adapting Deep Learning Techniques for Wireless Network

    Reem Alkanhel1,#, Abuzar B. M. Adam2,#, Samia Allaoua Chelloug1, Dina S. M. Hassan1,*, Mohammed Saleh Ali Muthanna3, Ammar Muthanna4

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 607-624, 2025, DOI:10.32604/cmc.2025.063206 - 09 June 2025

    Abstract The 3GPP standard defines the requirements for next-generation wireless networks, with particular attention to Ultra-Reliable Low-Latency Communications (URLLC), critical for applications such as Unmanned Aerial Vehicles (UAVs). In this context, Non-Orthogonal Multiple Access (NOMA) has emerged as a promising technique to improve spectrum efficiency and user fairness by allowing multiple users to share the same frequency resources. However, optimizing key parameters–such as beamforming, rate allocation, and UAV trajectory–presents significant challenges due to the nonconvex nature of the problem, especially under stringent URLLC constraints. This paper proposes an advanced deep learning-driven approach to address the resulting… More >

  • Open Access

    ARTICLE

    Cloud-Based Deep Learning for Real-Time URL Anomaly Detection: LSTM/GRU and CNN/LSTM Models

    Ayman Noor*

    Computer Systems Science and Engineering, Vol.49, pp. 259-286, 2025, DOI:10.32604/csse.2025.060387 - 21 February 2025

    Abstract Precisely forecasting the performance of Deep Learning (DL) models, particularly in critical areas such as Uniform Resource Locator (URL)-based threat detection, aids in improving systems developed for difficult tasks. In cybersecurity, recognizing harmful URLs is vital to lowering risks associated with phishing, malware, and other online-based attacks. Since it directly affects the model’s capacity to differentiate between benign and harmful URLs, finding the optimum mix of hyperparameters in DL models is a significant difficulty. Two commonly used architectures for sequential and spatial data processing, Long Short-Term Memory (LSTM)/Gated Recurrent Unit (GRU) and Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks

    Brij B. Gupta1,*, Akshat Gaurav2, Razaz Waheeb Attar3, Varsha Arya4, Shavi Bansal5, Ahmed Alhomoud6, Kwok Tai Chui7

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4853-4874, 2024, DOI:10.32604/cmc.2024.057138 - 19 December 2024

    Abstract Phishing attacks are more than two-decade-old attacks that attackers use to steal passwords related to financial services. After the first reported incident in 1995, its impact keeps on increasing. Also, during COVID-19, due to the increase in digitization, there is an exponential increase in the number of victims of phishing attacks. Many deep learning and machine learning techniques are available to detect phishing attacks. However, most of the techniques did not use efficient optimization techniques. In this context, our proposed model used random forest-based techniques to select the best features, and then the Brown-Bear optimization… More >

  • Open Access

    ARTICLE

    Securing Web by Predicting Malicious URLs

    Imran Khan, Meenakshi Megavarnam*

    Journal of Cyber Security, Vol.6, pp. 117-130, 2024, DOI:10.32604/jcs.2024.048332 - 06 December 2024

    Abstract A URL (Uniform Resource Locator) is used to locate a digital resource. With this URL, an attacker can perform a variety of attacks, which can lead to serious consequences for both individuals and organizations. Therefore, attackers create malicious URLs to gain access to an organization’s systems or sensitive information. It is crucial to secure individuals and organizations against these malicious URLs. A combination of machine learning and deep learning was used to predict malicious URLs. This research contributes significantly to the field of cybersecurity by proposing a model that seamlessly integrates the accuracy of machine More >

  • Open Access

    ARTICLE

    Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework

    Simona-Vasilica Oprea*, Adela Bâra

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3827-3853, 2024, DOI:10.32604/cmc.2024.051598 - 20 June 2024

    Abstract The potential of text analytics is revealed by Machine Learning (ML) and Natural Language Processing (NLP) techniques. In this paper, we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators (URLs). Three categories of features, both ML and Deep Learning (DL) algorithms and a ranking schema are included in the proposed framework. We apply frequency and prediction-based embeddings, such as hash vectorizer, Term Frequency-Inverse Dense Frequency (TF-IDF) and predictors, word to vector-word2vec (continuous bag of words, skip-gram) from Google, to extract features from text. Further, we apply more… More >

  • Open Access

    ARTICLE

    Phishing Website URL’s Detection Using NLP and Machine Learning Techniques

    Dinesh Kalla1,*, Sivaraju Kuraku2

    Journal on Artificial Intelligence, Vol.5, pp. 145-162, 2023, DOI:10.32604/jai.2023.043366 - 18 December 2023

    Abstract Phishing websites present a severe cybersecurity risk since they can lead to financial losses, data breaches, and user privacy violations. This study uses machine learning approaches to solve the problem of phishing website detection. Using artificial intelligence, the project aims to provide efficient techniques for locating and thwarting these dangerous websites. The study goals were attained by performing a thorough literature analysis to investigate several models and methods often used in phishing website identification. Logistic Regression, K-Nearest Neighbors, Decision Trees, Random Forests, Support Vector Classifiers, Linear Support Vector Classifiers, and Naive Bayes were all used More >

  • Open Access

    ARTICLE

    Assessing the Efficacy of Improved Learning in Hourly Global Irradiance Prediction

    Abdennasser Dahmani1, Yamina Ammi2, Nadjem Bailek3,4,*, Alban Kuriqi5,6, Nadhir Al-Ansari7,*, Salah Hanini2, Ilhami Colak8, Laith Abualigah9,10,11,12,13,14, El-Sayed M. El-kenawy15

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2579-2594, 2023, DOI:10.32604/cmc.2023.040625 - 29 November 2023

    Abstract Increasing global energy consumption has become an urgent problem as natural energy sources such as oil, gas, and uranium are rapidly running out. Research into renewable energy sources such as solar energy is being pursued to counter this. Solar energy is one of the most promising renewable energy sources, as it has the potential to meet the world’s energy needs indefinitely. This study aims to develop and evaluate artificial intelligence (AI) models for predicting hourly global irradiation. The hyperparameters were optimized using the Broyden-Fletcher-Goldfarb-Shanno (BFGS) quasi-Newton training algorithm and STATISTICA software. Data from two stations… More >

  • Open Access

    ARTICLE

    Optimizing Power Allocation for D2D Communication with URLLC under Rician Fading Channel: A Learning-to-Optimize Approach

    Owais Muhammad1, Hong Jiang1,*, Mushtaq Muhammad Umer1, Bilal Muhammad2, Naeem Muhammad Ahtsam3

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3193-3212, 2023, DOI:10.32604/iasc.2023.041232 - 11 September 2023

    Abstract To meet the high-performance requirements of fifth-generation (5G) and sixth-generation (6G) wireless networks, in particular, ultra-reliable and low-latency communication (URLLC) is considered to be one of the most important communication scenarios in a wireless network. In this paper, we consider the effects of the Rician fading channel on the performance of cooperative device-to-device (D2D) communication with URLLC. For better performance, we maximize and examine the system’s minimal rate of D2D communication. Due to the interference in D2D communication, the problem of maximizing the minimum rate becomes non-convex and difficult to solve. To solve this problem,… More >

  • Open Access

    ARTICLE

    Modelling an Efficient URL Phishing Detection Approach Based on a Dense Network Model

    A. Aldo Tenis*, R. Santhosh

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2625-2641, 2023, DOI:10.32604/csse.2023.036626 - 28 July 2023

    Abstract The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called phishing. The deep learning approaches and the machine learning are compared in the proposed system for presenting the methodology that can detect phishing websites via Uniform Resource Locator (URLs) analysis. The legal class is composed of the home pages with no inclusion of login forms in most of the present modern solutions, which deals with the detection of phishing. Contrarily, the URLs in both classes from the login page due, considering… More >

Displaying 1-10 on page 1 of 39. Per Page