Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "63fb2802-079a-4c09-aef1-489927574020"}, "_deposit": {"id": "4427", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4427"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4427", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Deep Neural Network Based Model for Phishing-Sites Detection", "subitem_1551255648112": "en_US"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The evolution of web has positivelytransformed the paradigm of communication,trading, and collaboration for the benefit ofhumanity. However, these benefits of the Web areshadowed by cyber-criminals who use the Web as amedium to perform malicious activities motivated byillegitimate benefits. Phishing is a growing threat toInternet users and causes billions of dollars indamage every year. The replicas of the legitimatesites are created and users are directed to that website by luring some offers to it. In this paper weintroduce a model of our ongoing research PhishingWebsite Detection for Advanced Persistent Threats.In this model we used deep neural network techniqueon some features of phishing sites."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Phishing"}, {"interim": "URL Feature"}, {"interim": "HTML Feature"}, {"interim": "Model"}, {"interim": "Social Engineering"}, {"interim": "Security"}, {"interim": "Anti Phishing Technique"}, {"interim": "Data Mining"}, {"interim": "ANN"}, {"interim": "DNN and Phishing Attack"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-10-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Deep Neural Network Based Model for Phishing-Sites Detection.pdf", "filesize": [{"value": "719 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 719000.0, "url": {"url": "https://meral.edu.mm/record/4427/files/Deep Neural Network Based Model for Phishing-Sites Detection.pdf"}, "version_id": "f5d66196-7353-4dab-bdcd-cf297d354704"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Zaw, San Kyaw"}, {"subitem_authors_fullname": "Oo, Khine Khine"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/2360"}, "item_title": "Deep Neural Network Based Model for Phishing-Sites Detection", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004427", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-10-25"}, "publish_date": "2019-10-25", "publish_status": "0", "recid": "4427", "relation": {}, "relation_version_is_last": true, "title": ["Deep Neural Network Based Model for Phishing-Sites Detection"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Deep Neural Network Based Model for Phishing-Sites Detection

http://hdl.handle.net/20.500.12678/0000004427
http://hdl.handle.net/20.500.12678/0000004427
733deb53-5247-4952-9d67-7fd705c16458
63fb2802-079a-4c09-aef1-489927574020
None
Preview
Name / File License Actions
Deep Deep Neural Network Based Model for Phishing-Sites Detection.pdf (719 Kb)
Publication type
Article
Upload type
Publication
Title
Title Deep Neural Network Based Model for Phishing-Sites Detection
Language en_US
Publication date 2016-02-25
Authors
Zaw, San Kyaw
Oo, Khine Khine
Description
The evolution of web has positivelytransformed the paradigm of communication,trading, and collaboration for the benefit ofhumanity. However, these benefits of the Web areshadowed by cyber-criminals who use the Web as amedium to perform malicious activities motivated byillegitimate benefits. Phishing is a growing threat toInternet users and causes billions of dollars indamage every year. The replicas of the legitimatesites are created and users are directed to that website by luring some offers to it. In this paper weintroduce a model of our ongoing research PhishingWebsite Detection for Advanced Persistent Threats.In this model we used deep neural network techniqueon some features of phishing sites.
Keywords
Phishing, URL Feature, HTML Feature, Model, Social Engineering, Security, Anti Phishing Technique, Data Mining, ANN, DNN and Phishing Attack
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/2360
Journal articles
Fourteenth International Conference On Computer Applications (ICCA 2016)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:46:33.825417
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL