Showing 1 - 3 results of 3 for search '"machine learning"', query time: 0.02s Refine Results
  1. 1
    by Liew, Seow Wooi
    Published 2019
    ..., ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing...
    Get full text
    Thesis
  2. 2
    by Ghasempour, Ali
    Published 2019
    ... statistical methods have been used to optimal distinguish malicious and benign applications. Machine learning...
    Get full text
    Thesis
  3. 3
    by Sarvari, Samira
    Published 2020
    ... of the system. In recent years, detection methods based on machine learning techniques are widely deployed...
    Get full text
    Thesis