Security alert framework using dynamic tweet-based features for phishing detection on twitter
Phishing is a form of social engineering crime that deceives victims by directing them to a fake website where their personal credentials are collected eventually for further unlawful activities. Traditionally, phishing attacks target email, but now they have reached to Online Social Networks (OS...
| Main Author: | Liew, Seow Wooi |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/84548/ http://psasir.upm.edu.my/id/eprint/84548/1/FSKTM%202019%2044%20ir.pdf |
Similar Items
An effective security alert mechanism for real-time phishing tweet detection on twitter
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016)
by: Xin, Mei Choo, et al.
Published: (2016)
A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
by: Masood, Munira, et al.
Published: (2009)
by: Masood, Munira, et al.
Published: (2009)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
by: Hasheminejad, Hamidreza
Published: (2015)
by: Hasheminejad, Hamidreza
Published: (2015)
Phishing website detection
by: Nur Sholihah, Zaini
Published: (2018)
by: Nur Sholihah, Zaini
Published: (2018)
A critical analysis on the computer misuse in cyber cafes and its governance in Shah Alam / Khairul Aizat Khairuddin, Khairunnisa Othman
by: Khairuddin, Khairul Aizat, et al.
Published: (2007)
by: Khairuddin, Khairul Aizat, et al.
Published: (2007)
An online framework for civil unrest prediction using tweet stream based on tweet weight and event diffusion
by: Islam, Md Kamrul, et al.
Published: (2020)
by: Islam, Md Kamrul, et al.
Published: (2020)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Computer Crimes Act 1997 v Computer Misuse Act 1993: the effectiveness in curbing hackers / Effa Suzieana Zainal, Nor Haslina Ismail and Nur Asyikin Mansoor.
by: Zainal, Effa Suzieana, et al.
Published: (2007)
by: Zainal, Effa Suzieana, et al.
Published: (2007)
A legal analysis on online pornographic law in Malaysia / Amirul Haziq Ahmad … [et al.]
by: Ahmad, Amirul Haziq, et al.
Published: (2014)
by: Ahmad, Amirul Haziq, et al.
Published: (2014)
A study on the protection of application software in Malaysia / Sarah Nadrah Muzaffa, Tuan Ruzuaini Tuan Lah
by: Muzaffa, Sarah Nadrah, et al.
Published: (2007)
by: Muzaffa, Sarah Nadrah, et al.
Published: (2007)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
POLITICAL NETWORKS ON TWITTER: Tweeting the Queensland state election
by: Bruns, A., et al.
Published: (2013)
by: Bruns, A., et al.
Published: (2013)
The adequacy of MyDRP in dealing with cybersquatters in Malaysia / Irianie Abdul Wahab
by: Abdul Wahab, Irianie
Published: (2005)
by: Abdul Wahab, Irianie
Published: (2005)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Critically Reviewing the Theory and Practice of Secured-by-design for Residential New-build Housing in Britain.
by: Cozens, Paul, et al.
Published: (2007)
by: Cozens, Paul, et al.
Published: (2007)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
E-Cigarette Promotion on Twitter in Australia: Content Analysis of Tweets
by: McCausland, Kahlia, et al.
Published: (2020)
by: McCausland, Kahlia, et al.
Published: (2020)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
Death penalty as deterrence for crimes / Hasmahani Hassan Hadeli, Imi Safwani Ismail and Karmuni Abdul Kadir
by: Hassan Hadeli, Hasmahani, et al.
Published: (2006)
by: Hassan Hadeli, Hasmahani, et al.
Published: (2006)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Phishing Website Detection Technique Using Machine Learning
by: Nurul Amira, Mohd Zin
Published: (2022)
by: Nurul Amira, Mohd Zin
Published: (2022)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
E-Cigarette Advocates on Twitter: Content Analysis of Vaping-Related Tweets
by: McCausland, Kahlia, et al.
Published: (2020)
by: McCausland, Kahlia, et al.
Published: (2020)
A legal analysis of the Malaysian anti-corruption commision’s independence under the legislative framework of the Malaysian Anti-Corruption Commision Act 2009 / Afzan Mohammad Azahar … [et al.]
by: Mohammad Azahar, Afzan, et al.
Published: (2009)
by: Mohammad Azahar, Afzan, et al.
Published: (2009)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Similar Items
-
An effective security alert mechanism for real-time phishing tweet detection on twitter
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019) -
Identity theft: a legal study on phishing / Khadijah Ilyana Mahayudin…[et al.].
by: Mahayudin, Khadijah Ilyana, et al.
Published: (2009) -
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015) -
Feature-based phishing detection technique
by: Xin, Mei Choo, et al.
Published: (2016) -
A comparative analysis on the adequacy of the computer crimes act 1997 in Malaysia and the computer misuse act 1990 in United Kingdom in governing the issue of phishing / Munira Masood...[et al.]
by: Masood, Munira, et al.
Published: (2009)