137
Views
11
CrossRef citations to date
0
Altmetric
Articles

Deep learning to combat phishing

&

References

  • Gaharwar, R.S. and Gupta, R., 2020. Review of cyber security threats and proposed trustworthy memory acquisition mechanism. Journal of Discrete Mathematical Sciences and Cryptography, 23(1), pp.137-144. doi: 10.1080/09720529.2020.1721877
  • Maurya, S. and Singhrova, A., 2018. Changing Trend in Network Security Measures: A Review. In Cyber Security (pp. 25-33). Springer, Singapore.
  • Maurya, S., Singh, H. and Jain, A., 2019. Browser Extension based Hybrid Anti-Phishing Framework using Feature Selection. International Journal of Advanced Computer Science and Applications, 10(11). doi: 10.14569/IJACSA.2019.0101178
  • Zittrain, J. and Edelman, B., 2003. Internet filtering in China. IEEE Internet Computing, 7(2), pp.70-77. doi: 10.1109/MIC.2003.1189191
  • zvelo (2019). Single-Use Phishing URLs Drive the Need for Zero-Second Detections. [online] zvelo. Available at: https://zvelo.com/single-use-phishing-urls-need-zero-second-detection/ [Accessed 2 October 2019].
  • Maurya, S. and Jain, A., 2018. Ranking based feature selection techniques for phishing website identification. In International Conference on Machine Learning and Data Science.
  • Kshirsagar, D. and Kumar, S., 2020. An ensemble feature reduction method for web-attack detection. Journal of Discrete Mathematical Sciences and Cryptography, 23(1), pp.283-291. doi: 10.1080/09720529.2020.1721861
  • Rahul, Kedia, P., Sarangi, S. and Monika, 2020. Analysis of machine learning models for malware detection. Journal of Discrete Mathematical Sciences and Cryptography, 23(2), pp.395-407. doi: 10.1080/09720529.2020.1721870
  • archive.ics.uci.edu. (n.d.). UCI Machine Learning Repository. [online] Available at: http://archive.ics.uci.edu/ml. [Accessed 11 November 2019].
  • Mehndiratta, P. and Soni, D., 2019. Identification of sarcasm using word embeddings and hyperparameters tuning. Journal of Discrete Mathematical Sciences and Cryptography, 22(4), pp.465-489. doi: 10.1080/09720529.2019.1637152
  • Zhang, X., Chen, X., Yao, L., Ge, C. and Dong, M., 2019, December. Deep Neural Network Hyperparameter Optimization with Orthogonal Array Tuning. In International Conference on Neural Information Processing (pp. 287-295). Springer, Cham.
  • Ruder, S., 2016. An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747.
  • Ye, Y. (n.d.). Second Order Optimization Algorithms I. [online] Available at: https://web.stanford.edu/class/msande311/2017lecture13.pdf [Accessed 14 November 2019].
  • Kingma, D.P. and Ba, J., 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.
  • Zeiler, M.D., 2012. Adadelta: an adaptive learning rate method. arXiv preprint arXiv:1212.5701.
  • Lin, J., Song, C., He, K., Wang, L. and Hopcroft, J.E., 2019. Nesterov Accelerated Gradient and Scale Invariance for Improving Transferability of Adversarial Examples. arXiv preprint arXiv:1908.06281.
  • Zou, F., Shen, L., Jie, Z., Sun, J. and Liu, W., 2018. Weighted AdaGrad with unified momentum. arXiv preprint arXiv:1808.03408.
  • Jin, X., Chen, Y., Dong, J., Feng, J. and Yan, S., 2016, October. Collaborative layer-wise discriminative learning in deep neural networks. In European Conference on Computer Vision (pp. 733-749). Springer, Cham.
  • De Boer, P.T., Kroese, D.P., Mannor, S. and Rubinstein, R.Y., 2005. A tutorial on the cross-entropy method. Annals of operations research, 134(1), pp.19-67. doi: 10.1007/s10479-005-5724-z

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.