A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3 different feature selection and 2 different dimensionality reduction techniques are used for comparison.
☆16Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for Phishing-Websites-Classification-using-Deep-Learning
Users that are interested in Phishing-Websites-Classification-using-Deep-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- Detect email phishing with Watson Natural Language Classifier☆38Jan 7, 2022Updated 4 years ago
- Chrome extension for detecting phishing web sites☆256Oct 2, 2020Updated 5 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆60Jun 1, 2021Updated 4 years ago
- Using Machine learning classifier developed GUI which takes the url of suspicious websites as input and tells the user if it is a benign …☆22Apr 11, 2021Updated 5 years ago
- ☆14Jan 25, 2023Updated 3 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Malicious Web Sites Detection using Suspicious URL☆76Oct 2, 2020Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Convolutional Neural Network (CNN) was trained on 48x48 pixel grayscale images to predict 5 different emotions from images. Ten different…☆11Sep 21, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Collection of cyber security and "AI" relevant topics☆74Jan 1, 2018Updated 8 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated 3 months ago
- ☆13Feb 14, 2020Updated 6 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- This is a list of useful information about urban mobility prediction. Related papers, datasets and codes are included.☆21Sep 18, 2022Updated 3 years ago
- Short-term load forecasting with machine learning☆10Nov 11, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- Predicting train delay using previous weather and delay information of trains☆11Oct 25, 2017Updated 8 years ago
- This is the accompanying repository to the paper: "Day-ahead net load forecasting with self-attention: dealing with meter and meta data u…☆10Jul 17, 2024Updated last year
- A multi-task learning method for multi-energy load forecasting based on synthesis correlation analysis and load participation factor☆13Aug 18, 2023Updated 2 years ago
- TensorFlow implementation of GoogLeNet.☆11May 15, 2018Updated 8 years ago
- Scheduling Strategy of Electric Vehicle Charging Considering Different Requirements of Power Grid and Users☆10Apr 16, 2021Updated 5 years ago
- Minimizing Carbon Emission during EV Charging☆15Jul 1, 2022Updated 3 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [Big Data Analytics]Analyzing relationship between changes in weather and its impact on the city taxis☆13Apr 29, 2017Updated 9 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- This project optimizes EV charging station placement and capacity using MATLAB. It calculates optimal locations based on voltage stabilit…☆16Oct 10, 2024Updated last year
- Undergraduate Research Project looking into Scheduling Optimization for Electric Vehicle Charging☆12Jun 7, 2013Updated 12 years ago
- A curated list of Awesome Threat Intelligence resources☆18Mar 27, 2019Updated 7 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- CCIE routing and switching notes and references, with a general directory and specific topic directories.☆27Oct 5, 2021Updated 4 years ago