Search Results - "Sodiya, A.S."
-
1
A predictive model for phishing detection
Published in Journal of King Saud University. Computer and information sciences (01-02-2022)“…Nowadays, many anti-phishing systems are being developed to identify phishing contents in online communication systems. Despite the availability of myriads…”
Get full text
Journal Article -
2
LINKCALCULATOR – AN EFFICIENT LINK-BASED PHISHING DETECTION TOOL
Published in Acta informatica Malaysia (02-10-2020)“…The problem of phishing attacks continues to demand new solutions as existing solutions are limited by various challenges such as high computational…”
Get full text
Journal Article -
3
A partition enhanced mining algorithm for distributed association rule mining systems
Published in Egyptian informatics journal (01-11-2015)“…The extraction of patterns and rules from large distributed databases through existing Distributed Association Rule Mining (DARM) systems is still faced with…”
Get full text
Journal Article -
4
Performance Assessment of some Phishing predictive models based on Minimal Feature corpus
Published in The journal of digital forensics, security and law (05-12-2021)“…The credentials harvested normally include bank account numbers, passwords or PINs, credit card numbers, security questions, security codes etc. In most…”
Get full text
Journal Article -
5
An improved two-tiered strategy to intrusion detection
Published in Information management & computer security (01-07-2005)“…Purpose - A work that combined strategies in designing anomaly-based instruction detection system (IDS) was described in CSIDS. This new work seeks to improve…”
Get full text
Journal Article -
6
A new two-tiered strategy to intrusion detection
Published in Information management & computer security (2004)“…Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work…”
Get full text
Journal Article -
7
Maintaining privacy in anomaly-based intrusion detection systems
Published in Information management & computer security (2005)“…Purpose - The goal of our work is to discuss the fundamental issues of privacy and anomaly-based intrusion detection systems (IDS) and to design an efficient…”
Get full text
Journal Article -
8
An improved twotiered strategy to intrusion detection
Published in Information management & computer security (01-07-2005)“…Purpose A work that combined strategies in designing anomalybased instruction detection system IDS was described in CSIDS. This new work seeks to improve on…”
Get full text
Journal Article -
9
Maintaining privacy in anomalybased intrusion detection systems
Published in Information management & computer security (01-02-2005)“…Purpose The goal of our work is to discuss the fundamental issues of privacy and anomalybased intrusion detection systems IDS and to design an efficient…”
Get full text
Journal Article -
10
A new twotiered strategy to intrusion detection
Published in Information management & computer security (01-02-2004)“…Researchers have used many techniques in designing intrusion detection systems IDS and yet we still do not have an effective IDS. The interest in this work is…”
Get full text
Journal Article