What is the recommended ratio of malware URLs to legitimate URLs that should be utilized when constructing a dataset for phishing URL detection?
I want researchers who specialize in studying artificial intelligence in the field of science education and those related to it to give me information about the application of the...
18 July 2024 8,320 0 View
What are the ways to integrate environmental and sustainability issues into science curricula: in response to environmental challenges in the Arab Gulf countries such as the Emirates, Qatar and...
18 July 2024 8,083 0 View
Hello, everyone. While transfecting my cells with plasmid, I noticed this overnight; normally, my cells are adherent (as seen in the background); I'd like to know if anyone else has seen this...
03 June 2024 216 4 View
Greetings, all. I trust you're doing well. My intention is to generate a spectrum depicting the Lyapunov exponents of the system concerning the parameter c within the range of \( [0, 200] \),...
16 April 2024 1,852 0 View
Dear Readers, I am writing to request assistance in obtaining numeric or number format data related to turbulent flow in ducts, specifically focusing on square, rectangular, and other geometries....
11 April 2024 1,596 1 View
Hello everyone ! We're doing research on the impact of store location on purchase behavior of consumers and we're confused on how to approach data collection and analysis in this...
26 March 2024 7,571 5 View
Is it possible to transfer blood from animals to humans?.
01 March 2024 5,734 3 View
Suppose you have 5 football teams each team meets the other teams once. The total number of matches is 10. We may represent the results of these matches by a graph, in which if team A wins over...
23 February 2024 4,943 2 View
I noticed that the number of undirected graphs of order n with degree sequence: 2,2,2,...2 (n times) is equal to the number of partitions of n
19 February 2024 2,549 6 View
According to epigenetic science, does it play a role in discovering genes that contain different amino acids that cause the appearance of characteristics or behaviors in people who eat meat and...
12 February 2024 4,158 1 View
Hi everyone, I'm starting with my project for my master's degree in cyber security and unfortunately, I'm having a hard time coming up with optional topics. I started discussing a a topic on the...
03 June 2024 2,090 4 View
What are the specific techniques used by these two countries, i need to do a comparative analysis of these two countries
30 May 2024 7,399 0 View
Pls how can I combine SVM-DT-RF and use it as a single android malware classifiers, how will the architecture and the algorithm look like?
13 March 2024 1,199 3 View
I am curr research at phising detection Using URL . Using logistic Regression model . I have data set 1:10 ratio 20k legitimate and 2 k phishing .
10 March 2024 9,531 2 View
I am currently engaged in research focused on advancing malware detection techniques and am excited about the potential for collaboration with like-minded professionals.
21 January 2024 1,893 3 View
phishing attack
07 January 2024 3,079 0 View
07 January 2024 6,435 1 View
As we navigate the evolving landscape of cybersecurity threats, the integration of artificial intelligence (AI) seems to play an increasingly pivotal role. I'm interested in exploring the future...
08 December 2023 7,007 3 View
Has any research been done on detecting malware embedded or attached with websites phishing? If available, kindly oblige me along with the dataset.
03 September 2023 5,923 3 View
I want a data set to test a model for detecting malware in files like exe files, pdf, word and another types
08 August 2023 1,436 1 View