Security alert framework using dynamic tweet-based features for phishing detection on twitter
Phishing is a form of social engineering crime that deceives victims by directing them to a fake website where their personal credentials are collected eventually for further unlawful activities. Traditionally, phishing attacks target email, but now they have reached to Online Social Networks (OS...
| Auteur principal: | Liew, Seow Wooi |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2019
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/84548/1/FSKTM%202019%2044%20ir.pdf |
Documents similaires
Scientific forensic framework for smartphones
par: Shahpasand, Maryam
Publié: (2015)
par: Shahpasand, Maryam
Publié: (2015)
Classification of terrorism based on tweet text post on twitter using term weighting schemes
par: Muhammad, Muhammad Fikri Arif
Publié: (2018)
par: Muhammad, Muhammad Fikri Arif
Publié: (2018)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
par: Hasheminejad, Hamidreza
Publié: (2015)
par: Hasheminejad, Hamidreza
Publié: (2015)
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
The adequacy of MyDRP in dealing with cybersquatters in Malaysia / Irianie Abdul Wahab
par: Abdul Wahab, Irianie
Publié: (2005)
par: Abdul Wahab, Irianie
Publié: (2005)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
par: Al-Saedi, Karim Hashim Kraidi
Publié: (2013)
par: Al-Saedi, Karim Hashim Kraidi
Publié: (2013)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
par: Draib, Najla'a Ateeq Mohammed
Publié: (2022)
DDOS avoidance strategy for service avalibilty
par: AlRashidi, Bedour Fahhad Hamed
Publié: (2015)
par: AlRashidi, Bedour Fahhad Hamed
Publié: (2015)
Features selection for intrusion detection system using hybridize PSO-SVM
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
par: Tabaan, Alaa Abdulrahman
Publié: (2016)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
par: Sinnanaidu, Subba Rao
Publié: (2004)
par: Sinnanaidu, Subba Rao
Publié: (2004)
A tool for modeling software security requirements using security patterns
par: Maher, Zulfikar Ahmed
Publié: (2016)
par: Maher, Zulfikar Ahmed
Publié: (2016)
Intrusion Alert Quality Framework For
Security False Alert Reduction
par: Abu Bakar, Najwa
Publié: (2007)
par: Abu Bakar, Najwa
Publié: (2007)
The dependencies of economic indicators towards violent crime: a case study in Malaysia / Muhammad Akmal Ridzuan Abd Rahim
par: Abd Rahim, Muhammad Akmal Ridzuan
Publié: (2016)
par: Abd Rahim, Muhammad Akmal Ridzuan
Publié: (2016)
Depression prediction system from Twitter’s tweet by using sentiment analysis / Nur Amalina Kamaruddin
par: Kamaruddin, Nur Amalina
Publié: (2020)
par: Kamaruddin, Nur Amalina
Publié: (2020)
Secure block cipher inspired by the human immune system
par: Ariffin, Suriyani
Publié: (2012)
par: Ariffin, Suriyani
Publié: (2012)
Network security situation awareness based on indicators extracted
par: Xie, Zeqiang
Publié: (2016)
par: Xie, Zeqiang
Publié: (2016)
English-Malay Cross-Lingual Emotion Detection In Tweets Using Word Embedding Alignment
par: Lim, Ying Hao
Publié: (2023)
par: Lim, Ying Hao
Publié: (2023)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
par: Mohamed Yassin, Warusia
Publié: (2015)
par: Mohamed Yassin, Warusia
Publié: (2015)
Information security policy compliance model for government agency
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
par: Ramli, Muhamad Amirnazmi
Publié: (2018)
Legal implications of land fraud on security of tenure under the conveyancing law and practices in West Malaysia / Noraziah Abu Bakar
par: Abu Bakar, Noraziah
Publié: (2019)
par: Abu Bakar, Noraziah
Publié: (2019)
An efficient crime group of secured data sharing scheme in cloud
par: Rashid, Mustafa Noori
Publié: (2018)
par: Rashid, Mustafa Noori
Publié: (2018)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
par: Malekzadeh, Mina
Publié: (2011)
par: Malekzadeh, Mina
Publié: (2011)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
par: Abbas, Borkan Ahmed
Publié: (2016)
par: Abbas, Borkan Ahmed
Publié: (2016)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
par: Ismaeel, Nooruldeen Qutaiba
Publié: (2016)
par: Ismaeel, Nooruldeen Qutaiba
Publié: (2016)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
par: Noor Syahirah, Nordin
Publié: (2022)
par: Noor Syahirah, Nordin
Publié: (2022)
Permission extraction framework for android malware detection
par: Ghasempour, Ali
Publié: (2019)
par: Ghasempour, Ali
Publié: (2019)
A comparison of different technique in flow based anomaly detection
par: Salah, Mohammad
Publié: (2017)
par: Salah, Mohammad
Publié: (2017)
Development of DNA-based dynamic key-dependent block cipher
par: Saeed, Auday H.
Publié: (2015)
par: Saeed, Auday H.
Publié: (2015)
Understanding the lived experiences of cyberbullying and coping strategies among social media influencers on social media
par: Ab Rashid, Faridah Hanem
Publié: (2022)
par: Ab Rashid, Faridah Hanem
Publié: (2022)
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014)
par: Memari, Nogol
Publié: (2014)
Twitter opinion about leaders
par: Osanga, Ibrahim Salamatu
Publié: (2014)
par: Osanga, Ibrahim Salamatu
Publié: (2014)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
par: Hadi, Ahmed Adnan
Publié: (2022)
par: Hadi, Ahmed Adnan
Publié: (2022)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)
par: Javan, Ali
Publié: (2011)
Enhanced framework for alert processing using clustering approach based on artificial immune system
par: Mohamed, Ashara Banu
Publié: (2015)
par: Mohamed, Ashara Banu
Publié: (2015)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
par: Hydara, Isatou
Publié: (2015)
par: Hydara, Isatou
Publié: (2015)
Anti-phishing model for phishing websites detection: using pruning decision tree
par: M. Abunadi, Ahmed I.
Publié: (2013)
par: M. Abunadi, Ahmed I.
Publié: (2013)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
par: Sultan Suhaibuddeen, Mohamed Sulaiman
Publié: (2010)
par: Sultan Suhaibuddeen, Mohamed Sulaiman
Publié: (2010)
Shopping Discount Alert System
par: Sahab, Noor Mezher
Publié: (2012)
par: Sahab, Noor Mezher
Publié: (2012)
Documents similaires
-
Scientific forensic framework for smartphones
par: Shahpasand, Maryam
Publié: (2015) -
Classification of terrorism based on tweet text post on twitter using term weighting schemes
par: Muhammad, Muhammad Fikri Arif
Publié: (2018) -
Honeynet as a service deployment approach in enabling virtual crime scene investigation
par: Hasheminejad, Hamidreza
Publié: (2015) -
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017) -
The adequacy of MyDRP in dealing with cybersquatters in Malaysia / Irianie Abdul Wahab
par: Abdul Wahab, Irianie
Publié: (2005)