<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/128">
<title>Computer Science</title>
<link>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/128</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540"/>
<rdf:li rdf:resource="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9045"/>
<rdf:li rdf:resource="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9044"/>
<rdf:li rdf:resource="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9043"/>
</rdf:Seq>
</items>
<dc:date>2026-04-28T11:57:51Z</dc:date>
</channel>
<item rdf:about="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540">
<title>Understanding phishers’ strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach</title>
<link>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9540</link>
<description>Understanding phishers’ strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach
Samantha Tharani, J.; Arachchilage, N.A.G.
Phishing is a type of social engineering attack with an intention to steal user data,&#13;
including login credentials and credit card numbers, leading to financial losses&#13;
for both organizations and individuals. It occurs when an attacker, pretending&#13;
as a trusted entity, lure a victim into click on a link or attachment in an email,&#13;
or in a text message. Phishing is often launched via email messages or text messages over social networks. Previous research has revealed that phishing attacks&#13;
can be identified just by looking at uniform resource locator (URLs). Identifying&#13;
the techniques which are used by phishers to mimic a phishing URL is rather a&#13;
challenging issue. At present, we have limited knowledge and understanding of&#13;
how cyber-criminals attempt to mimic URLs with the same look and feel of the&#13;
legitimate ones, to entice people into clicking links. Therefore, this paper investigates the feature selection of phishing URLs (uniform resource locators), aiming&#13;
to explore the strategies employed by phishers to mimic URLs that can obviously trick people into clicking links. We employed an information gain (IG) and&#13;
Chi-Squared feature selection methods in machine learning (ML) on a phishing&#13;
dataset. The dataset contains a total of 48 features extracted from 5000 phishing and another 5000 legitimate URL from web pages downloaded from January&#13;
to May 2015 and from May to June 2017. Our results revealed that there were&#13;
10 techniques that phishers used to mimic URLs to manipulate humans into&#13;
clicking links. Identifying these phishing URL manipulation techniques would&#13;
certainly help to educate individuals and organizations and keep them safe from&#13;
phishing attacks. In addition, the findings of this research will also help develop&#13;
anti-phishing tools, framework or browser plugins for phishing prevention.
</description>
<dc:date>2020-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9045">
<title>The Boost of Deep Learning: Why Now and Not Earlier?</title>
<link>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9045</link>
<description>The Boost of Deep Learning: Why Now and Not Earlier?
Manivannan, S.
</description>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9044">
<title>Shallow Learning Vs Deep Learning</title>
<link>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9044</link>
<description>Shallow Learning Vs Deep Learning
Ramanan, A.
</description>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9043">
<title>Semi-Supervised Deep Learning Approaches for Classifying Surface Defects</title>
<link>http://repo.lib.jfn.ac.lk/ujrr/handle/123456789/9043</link>
<description>Semi-Supervised Deep Learning Approaches for Classifying Surface Defects
Mayuravaani, M.
</description>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
