Optimal Detection of Phising Attack using SCA based K-NN

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm

Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN) algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on th...

متن کامل

Efficient anomaly detection using bipartite k-NN graphs

Learning minimum volume sets of an underlying nominal distribution is a very effective approach to anomaly detection. Several approaches to learning minimum volume sets have been proposed in the literature, including the K-point nearest neighbor graph (K-kNNG) algorithm based on the geometric entropy minimization (GEM) principle [4]. The K-kNNG detector, while possessing several desirable chara...

متن کامل

Detection and Classification of Brain Tumor Using SVM And K-NN Based Clustering

This work deals with the brain tumor detection and segmentation in multi sequence MR images with particular focus on highand low-grade gliomas. Three methods are propose for this purpose. This method takes the advantage of a fact that most medical images feature a high similarity in intensities of nearby pixels and a strong correlation of intensity profiles across different image modalities. On...

متن کامل

Wavelet Based Face Recognition using ROIs and k-NN

In this paper, human face recognition of still images has been proposed. The proposed system involves five steps: face detection by AdaBoost face detector, region of interest (ROI) extraction, feature extraction using discrete wavelet transform (DWT), dimensionality reduction by employing independent component analysis (ICA) and classification using k-Nearest Neighborhood (k-NN) classifier. Exp...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2020

ISSN: 1877-0509

DOI: 10.1016/j.procs.2020.04.184