2019
DOI: 10.1007/s10489-019-01433-4
|View full text |Cite
|
Sign up to set email alerts
|

Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…CNN was used as a single classifier in numerous research to distinguish between phishing and legitimate websites [7,8,20,[24][25][26][27][28]. It can also be used in combination with other DL techniques to form an ensemble model and to improve phishing detection accuracy [10,11,[29][30][31][32][33][34][35][36]. The difference between the architectures of CNN and DNN is the use of convolutional layers and kernels.…”
Section: Convolutional Neural Network (Cnn)mentioning
confidence: 99%
See 1 more Smart Citation
“…CNN was used as a single classifier in numerous research to distinguish between phishing and legitimate websites [7,8,20,[24][25][26][27][28]. It can also be used in combination with other DL techniques to form an ensemble model and to improve phishing detection accuracy [10,11,[29][30][31][32][33][34][35][36]. The difference between the architectures of CNN and DNN is the use of convolutional layers and kernels.…”
Section: Convolutional Neural Network (Cnn)mentioning
confidence: 99%
“…While this problem was avoided in [10], details of optimizing these parameters were not provided in the paper. Similarly, the authors of [24,28,29,32] described the optimization process, but only on certain parameters, for example, the number of convolutional layers, number of kernels, and kernel size. Additionally, in terms of performance metrics, it was observed that accuracy, precision, recall, and F1-score were the most common measures [7,24,28,[30][31][32]34,35,37,38].…”
Section: Convolutional Neural Network (Cnn)mentioning
confidence: 99%
“…Some recent works focus on deep learning methods. For example, Peng et al proposed a joint CNN and LSTM based attention mechanism [25]; Mahudeswaran and Liu combined RNN and LSTM [20] and Wang et al put forward a bidirectional LSTM algorithm based on CNN and independent RNN [22]. These research proved their method best in their data sets.…”
Section: B Classical Machine Learning Techniquesmentioning
confidence: 99%
“…A few more past lexicon-based works are presented in Table 3 below. [47] Sentence level Weight scheme Tweets 70% [48] Phrase level OpenDover (web service) Tweets 75% [49] Sentence level Semantic-based lexicon analysis Tweets - A few more past lexicon-based works are presented in Table 3 below. Lexicons are built for applications, such as online product reviews, blogs, Twitter, medical forums, etc., and various works related to them are presented.…”
Section: Lexicon-based Sentiment Analysis: a Reviewmentioning
confidence: 99%