2021
DOI: 10.1587/transinf.2020edl8147
|View full text |Cite
|
Sign up to set email alerts
|

Malicious URLs Detection Based on a Novel Optimization Algorithm

Abstract: In this paper, the issue of malicious URL detection is investigated. Firstly a P system is proposed. Then the new P system is introduced to design the optimization algorithm of BP neural network to achieve the malicious URL detection with better performance. In the end some examples are included and corresponding experimental results display the advantage and effectiveness of the optimization algorithm proposed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…Related scholars put forward the idea of public key cryptosystem, which uses mathematical functions as basic tools instead of substitution and replacement [25][26][27]. e basic feature of the public key cryptographic algorithm is that the public key and the private key are used asymmetrically in the encryption process and the decryption process.…”
Section: Related Workmentioning
confidence: 99%
“…Related scholars put forward the idea of public key cryptosystem, which uses mathematical functions as basic tools instead of substitution and replacement [25][26][27]. e basic feature of the public key cryptographic algorithm is that the public key and the private key are used asymmetrically in the encryption process and the decryption process.…”
Section: Related Workmentioning
confidence: 99%
“…In the positioning process, the positioning client starts to send the iBeacon information of the current location to the positioning server, and after the positioning server receives the message from the client, it makes the location estimation and returns the estimated location coordinates to the positioning client, and the positioning client displays the location coordinates according to the received location. At the end of the positioning process, the positioning client stops sending the current location beacon signal information to the positioning server and, at the same time, sends a positioning termination request to the scheduling server [19][20][21]. e scheduling service receives the positioning termination request, then performs the positioning termination operation, and then sends a termination completion command to the positioning client after the operation is completed.…”
Section: Low-power Ibeacon Network System Designmentioning
confidence: 99%
“…For quality evaluation metrics [ 104 ], we considered the average of solutions as the primary metric to judge the accuracy of the performance. We fixed fair judgments as per references [ 24 , 85 , 105 , 106 ]. For having an exhaustive vision of the proposed algorithm, different algorithms are created with separate techniques used in EHHO.…”
Section: Resultsmentioning
confidence: 99%