<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Computer Science</title>
<link href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/128" rel="alternate"/>
<subtitle/>
<id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/128</id>
<updated>2026-04-28T13:14:58Z</updated>
<dc:date>2026-04-28T13:14:58Z</dc:date>
<entry>
<title>Understanding phishers’ strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach</title>
<link href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540" rel="alternate"/>
<author>
<name>Samantha Tharani, J.</name>
</author>
<author>
<name>Arachchilage, N.A.G.</name>
</author>
<id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540</id>
<updated>2023-06-08T06:38:49Z</updated>
<published>2020-01-01T00:00:00Z</published>
<summary type="text">Understanding phishers’ strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach
Samantha Tharani, J.; Arachchilage, N.A.G.
Phishing is a type of social engineering attack with an intention to steal user data,&#13;
including login credentials and credit card numbers, leading to financial losses&#13;
for both organizations and individuals. It occurs when an attacker, pretending&#13;
as a trusted entity, lure a victim into click on a link or attachment in an email,&#13;
or in a text message. Phishing is often launched via email messages or text messages over social networks. Previous research has revealed that phishing attacks&#13;
can be identified just by looking at uniform resource locator (URLs). Identifying&#13;
the techniques which are used by phishers to mimic a phishing URL is rather a&#13;
challenging issue. At present, we have limited knowledge and understanding of&#13;
how cyber-criminals attempt to mimic URLs with the same look and feel of the&#13;
legitimate ones, to entice people into clicking links. Therefore, this paper investigates the feature selection of phishing URLs (uniform resource locators), aiming&#13;
to explore the strategies employed by phishers to mimic URLs that can obviously trick people into clicking links. We employed an information gain (IG) and&#13;
Chi-Squared feature selection methods in machine learning (ML) on a phishing&#13;
dataset. The dataset contains a total of 48 features extracted from 5000 phishing and another 5000 legitimate URL from web pages downloaded from January&#13;
to May 2015 and from May to June 2017. Our results revealed that there were&#13;
10 techniques that phishers used to mimic URLs to manipulate humans into&#13;
clicking links. Identifying these phishing URL manipulation techniques would&#13;
certainly help to educate individuals and organizations and keep them safe from&#13;
phishing attacks. In addition, the findings of this research will also help develop&#13;
anti-phishing tools, framework or browser plugins for phishing prevention.
</summary>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>The Boost of Deep Learning: Why Now and Not Earlier?</title>
<link href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9045" rel="alternate"/>
<author>
<name>Manivannan, S.</name>
</author>
<id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9045</id>
<updated>2023-02-09T04:36:25Z</updated>
<published>2022-01-01T00:00:00Z</published>
<summary type="text">The Boost of Deep Learning: Why Now and Not Earlier?
Manivannan, S.
</summary>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Shallow Learning Vs Deep Learning</title>
<link href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9044" rel="alternate"/>
<author>
<name>Ramanan, A.</name>
</author>
<id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9044</id>
<updated>2023-02-09T04:34:38Z</updated>
<published>2022-01-01T00:00:00Z</published>
<summary type="text">Shallow Learning Vs Deep Learning
Ramanan, A.
</summary>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Semi-Supervised Deep Learning Approaches for Classifying Surface Defects</title>
<link href="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9043" rel="alternate"/>
<author>
<name>Mayuravaani, M.</name>
</author>
<id>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9043</id>
<updated>2023-02-09T04:32:00Z</updated>
<published>2022-01-01T00:00:00Z</published>
<summary type="text">Semi-Supervised Deep Learning Approaches for Classifying Surface Defects
Mayuravaani, M.
</summary>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</entry>
</feed>
