A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3 different feature selection and 2 different dimensionality reduction techniques are used for comparison.
☆16Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for Phishing-Websites-Classification-using-Deep-Learning
Users that are interested in Phishing-Websites-Classification-using-Deep-Learning are comparing it to the libraries listed below
Sorting:
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago
- Detect email phishing with Watson Natural Language Classifier☆38Jan 7, 2022Updated 4 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Chrome extension for detecting phishing web sites☆256Oct 2, 2020Updated 5 years ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- Machine Learning for Phishing Website Detection☆56Mar 1, 2020Updated 6 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- Traffic dataset for pems04 and pems08☆10Dec 22, 2025Updated 2 months ago
- FTRL-Proximal Online Learning Algorithm☆15May 22, 2017Updated 8 years ago
- Command line tools for Qualcomm EFS file system☆11Jan 16, 2020Updated 6 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- This is the accompanying repository to the paper: "Day-ahead net load forecasting with self-attention: dealing with meter and meta data u…☆10Jul 17, 2024Updated last year
- Undergraduate Research Project looking into Scheduling Optimization for Electric Vehicle Charging☆12Jun 7, 2013Updated 12 years ago
- Scheduling Strategy of Electric Vehicle Charging Considering Different Requirements of Power Grid and Users☆10Apr 16, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Predicting train delay using previous weather and delay information of trains☆11Oct 25, 2017Updated 8 years ago
- ☆13Updated this week
- BSD-licensed open source Java library for consuming NVDB REST API☆14Sep 5, 2025Updated 6 months ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Emergency Vehicle Smart Grid to provide faster movement to emergency vehicles.☆11Dec 12, 2019Updated 6 years ago
- Source code for the paper titled: "Unlocking the full potential of smart charging: Addressing paused and delayed charging problems in ele…☆11May 22, 2024Updated last year
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- jhipster multi tenancy with schema selection (share db connections) on mariadb☆12Oct 25, 2017Updated 8 years ago
- ☆13Sep 22, 2017Updated 8 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Execute commands on Source Engine textmode windows (and otherwise)☆11Feb 22, 2022Updated 4 years ago
- a (semi)functional version of The Gravity Hull editor tool by superllama for Garry's Mod 13☆10Mar 12, 2018Updated 8 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Detection of abnormal patterns in electricity usage via time series forecasting☆11Apr 15, 2018Updated 7 years ago
- Character Embedding + ESIM + Focal Loss for Chinese Answer Sentence Selection☆10Jan 4, 2020Updated 6 years ago
- ☆11Nov 13, 2024Updated last year
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- Distributed approach of scheduling residential EV charging to maintain reliability of power distribution grids.☆11Nov 1, 2023Updated 2 years ago
- 新词发现分布式机器学习算法。☆15Jul 21, 2014Updated 11 years ago