<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/128" />
  <subtitle />
  <id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/128</id>
  <updated>2026-04-07T12:44:49Z</updated>
  <dc:date>2026-04-07T12:44:49Z</dc:date>
  <entry>
    <title>Understanding phishers’ strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach</title>
    <link rel="alternate" href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540" />
    <author>
      <name>Samantha Tharani, J.</name>
    </author>
    <author>
      <name>Arachchilage, N.A.G.</name>
    </author>
    <id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540</id>
    <updated>2023-06-08T06:38:49Z</updated>
    <published>2020-01-01T00:00:00Z</published>
    <summary type="text">Title: Understanding phishers’ strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach
Authors: Samantha Tharani, J.; Arachchilage, N.A.G.
Abstract: Phishing is a type of social engineering attack with an intention to steal user data,&#xD;
including login credentials and credit card numbers, leading to financial losses&#xD;
for both organizations and individuals. It occurs when an attacker, pretending&#xD;
as a trusted entity, lure a victim into click on a link or attachment in an email,&#xD;
or in a text message. Phishing is often launched via email messages or text messages over social networks. Previous research has revealed that phishing attacks&#xD;
can be identified just by looking at uniform resource locator (URLs). Identifying&#xD;
the techniques which are used by phishers to mimic a phishing URL is rather a&#xD;
challenging issue. At present, we have limited knowledge and understanding of&#xD;
how cyber-criminals attempt to mimic URLs with the same look and feel of the&#xD;
legitimate ones, to entice people into clicking links. Therefore, this paper investigates the feature selection of phishing URLs (uniform resource locators), aiming&#xD;
to explore the strategies employed by phishers to mimic URLs that can obviously trick people into clicking links. We employed an information gain (IG) and&#xD;
Chi-Squared feature selection methods in machine learning (ML) on a phishing&#xD;
dataset. The dataset contains a total of 48 features extracted from 5000 phishing and another 5000 legitimate URL from web pages downloaded from January&#xD;
to May 2015 and from May to June 2017. Our results revealed that there were&#xD;
10 techniques that phishers used to mimic URLs to manipulate humans into&#xD;
clicking links. Identifying these phishing URL manipulation techniques would&#xD;
certainly help to educate individuals and organizations and keep them safe from&#xD;
phishing attacks. In addition, the findings of this research will also help develop&#xD;
anti-phishing tools, framework or browser plugins for phishing prevention.</summary>
    <dc:date>2020-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>The Boost of Deep Learning: Why Now and Not Earlier?</title>
    <link rel="alternate" href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9045" />
    <author>
      <name>Manivannan, S.</name>
    </author>
    <id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9045</id>
    <updated>2023-02-09T04:36:25Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: The Boost of Deep Learning: Why Now and Not Earlier?
Authors: Manivannan, S.</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Shallow Learning Vs Deep Learning</title>
    <link rel="alternate" href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9044" />
    <author>
      <name>Ramanan, A.</name>
    </author>
    <id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9044</id>
    <updated>2023-02-09T04:34:38Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: Shallow Learning Vs Deep Learning
Authors: Ramanan, A.</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Semi-Supervised Deep Learning Approaches for Classifying Surface Defects</title>
    <link rel="alternate" href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9043" />
    <author>
      <name>Mayuravaani, M.</name>
    </author>
    <id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9043</id>
    <updated>2023-02-09T04:32:00Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: Semi-Supervised Deep Learning Approaches for Classifying Surface Defects
Authors: Mayuravaani, M.</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

