منابع مشابه
Comparisons of machine learning techniques for detecting malicious webpages
This paper compares machine learning techniques for detecting malicious webpages. The conventional method of detecting malicious webpages is going through the black list and checking whether the webpages are listed. Black list is a list of webpages which are classified as malicious from a user's point of view. These black lists are created by trusted organizations and volunteers. They are then ...
متن کاملBenign vs. Malicious Ghosts in Higher-derivative Theories
Interacting theories with higher-derivatives involve ghosts. They correspond to instabilities that display themselves at the classical level. We notice that comparatively “benign” mechanical higher-derivative systems exist, where the classical vacuum is stable with respect to small perturbations and the problems appear only at the nonperturbative level. We argue the existence of benign higher-d...
متن کاملFeature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملEnriching Webpages with Semantic Information
This paper proposes a tool to automatically enrich webpages with semantic information by annotating keywords in the document with microdata markup. There are two case studies described and implemented in this paper. The first case study focuses on generating new webpages with microdata and the second case study focuses on enriching existing webpages with microdata. This paper also demonstrates ...
متن کاملDataset of anomalies and malicious acts in a cyber-physical subsystem
This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Data in Brief
سال: 2020
ISSN: 2352-3409
DOI: 10.1016/j.dib.2020.106304