Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Adaptive-Feature Centric XGBoost Ensemble Classifier Model for Improved Malware Detection and Classification

    J. Pavithra*, S. Selvakumarasamy

    Journal of Cyber Security, Vol.4, No.3, pp. 135-151, 2022, DOI:10.32604/jcs.2022.031889

    Abstract Machine learning (ML) is often used to solve the problem of malware detection and classification, and various machine learning approaches are adapted to the problem of malware classification; still acquiring poor performance by the way of feature selection, and classification. To address the problem, an efficient novel algorithm for adaptive feature-centered XG Boost Ensemble Learner Classifier “AFC-XG Boost” is presented in this paper. The proposed model has been designed to handle varying data sets of malware detection obtained from Kaggle data set. The model turns the XG Boost classifier in several stages to optimize performance. At preprocessing stage, the data… More >

  • Open Access

    ARTICLE

    Enhancing Detection of Malicious URLs Using Boosting and Lexical Features

    Mohammad Atrees*, Ashraf Ahmad, Firas Alghanim

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1405-1422, 2022, DOI:10.32604/iasc.2022.020229

    Abstract A malicious URL is a link that is created to spread spams, phishing, malware, ransomware, spyware, etc. A user may download malware that can adversely affect the computer by clicking on an infected URL, or might be convinced to provide confidential information to a fraudulent website causing serious losses. These threats must be identified and handled in a decent time and in an effective way. Detection is traditionally done through the blacklist usage method, which relies on keyword matching with previously known malicious domain names stored in a repository. This method is fast and easy to implement, with the advantage… More >

Displaying 1-10 on page 1 of 2. Per Page