no code implementations • 15 Apr 2024 • Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones
This study focuses on the detection of phishing websites using deep learning models such as Multi-Head Attention, Temporal Convolutional Network (TCN), BI-LSTM, and LSTM where URLs of the phishing websites are treated as a sequence.
no code implementations • 17 Dec 2021 • Saroj Gopali, Faranak Abri, Sima Siami-Namini, Akbar Siami Namin
Recently, deep learning techniques have been introduced and explored in the context of time series analysis and prediction.
no code implementations • 3 Jun 2021 • Faranak Abri, Luis Felipe Gutierrez, Chaitra T. Kulkarni, Akbar Siami Namin, Keith S. Jones
The results of the open card sorting study showed a large amount of inter-participant variation making the research team wonder how the consequences of security attacks were comprehended by the participants.
no code implementations • 28 Dec 2020 • Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones
In this paper, we crafted a set of phishing and legitimate emails with similar indicators in order to investigate whether these cues are captured or disregarded by email embeddings, i. e., vectorizations.
no code implementations • 4 Dec 2020 • Faranak Abri, Luis Felipe Gutiérrez, Akbar Siami Namin, David R. W. Sears, Keith S. Jones
This paper conducts an experiment through which several mainstream and conventional machine learning algorithms are developed to study the prediction of emotions perceived from sounds.
no code implementations • 8 Oct 2020 • Faranak Abri, Luis Felipe Gutierrez, Akbar Siami Namin, Keith S. Jones, David R. W. Sears
Online reviews play an integral part for success or failure of businesses.
no code implementations • 14 Jun 2020 • Luis Gutierrez-Espinoza, Faranak Abri, Akbar Siami Namin, Keith S. Jones, David R. W. Sears
Customers represent their satisfactions of consuming products by sharing their experiences through the utilization of online reviews.
no code implementations • 21 Nov 2019 • Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin
The detection of zero-day attacks and vulnerabilities is a challenging problem.