Articles with "detecting malicious" as a keyword



Photo by cokdewisnu from unsplash

Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3222307

Abstract: In recent years, the digital world has advanced significantly, particularly on the Internet, which is critical given that many of our activities are now conducted online. As a result of attackers’ inventive techniques, the risk… read more here.

Keywords: using machine; machine learning; urls using; malicious urls ... See more keywords
Photo by etienne_beauregard from unsplash

Digital Watermarking for Detecting Malicious Intellectual Property Cores in NoC Architectures

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2022.3167606

Abstract: System-on-chip (SoC) developers utilize intellectual property (IP) cores from third-party vendors due to increasing design complexity, cost, as well as time-to-market constraints. A typical SoC consists of a wide variety of IP cores [such as… read more here.

Keywords: intellectual property; watermarking detecting; property cores; digital watermarking ... See more keywords
Photo from wikipedia

An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/3241216

Abstract: The World Wide Web services are essential in our daily lives and are available to communities through Uniform Resource Locator (URL). Attackers utilize such means of communication and create malicious URLs to conduct fraudulent activities… read more here.

Keywords: machine learning; learning models; deep learning; learning deep ... See more keywords