Search Results for author: Mahathir Almashor

Found 6 papers, 2 papers with code

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

no code implementations4 Sep 2022 Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere

We then reported our sites to VirusTotal and other platforms, with regular polling of results for 7 days, to ascertain the efficacy of each cloning technique.

Towards Web Phishing Detection Limitations and Mitigation

no code implementations3 Apr 2022 Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

However, with an average of 10K phishing links reported per hour to platforms such as PhishTank and VirusTotal (VT), the deficiencies of such ML-based solutions are laid bare.

Attribute

Characterizing Malicious URL Campaigns

1 code implementation29 Aug 2021 Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

Seemingly dissimilar URLs are being used in an organized way to perform phishing attacks and distribute malware.

Evaluation of Federated Learning in Phishing Email Detection

no code implementations27 Jul 2020 Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng

For a fixed total email dataset, the global RNN based model suffers by a 1. 8% accuracy drop when increasing organizational counts from 2 to 10.

Distributed Computing Federated Learning +2

Cannot find the paper you are looking for? You can Submit a new open access paper.