Picture for Raj Gaire

Raj Gaire

CSIROs Data61

Profiler: Profile-Based Model to Detect Phishing Emails

Add code
Aug 18, 2022
Figure 1 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 2 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 3 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 4 for Profiler: Profile-Based Model to Detect Phishing Emails
Viaarxiv icon

Towards Web Phishing Detection Limitations and Mitigation

Add code
Apr 03, 2022
Figure 1 for Towards Web Phishing Detection Limitations and Mitigation
Figure 2 for Towards Web Phishing Detection Limitations and Mitigation
Figure 3 for Towards Web Phishing Detection Limitations and Mitigation
Figure 4 for Towards Web Phishing Detection Limitations and Mitigation
Viaarxiv icon

Characterizing Malicious URL Campaigns

Add code
Aug 29, 2021
Figure 1 for Characterizing Malicious URL Campaigns
Figure 2 for Characterizing Malicious URL Campaigns
Figure 3 for Characterizing Malicious URL Campaigns
Figure 4 for Characterizing Malicious URL Campaigns
Viaarxiv icon

ReinforceBug: A Framework to Generate Adversarial Textual Examples

Add code
Mar 11, 2021
Figure 1 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Figure 2 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Figure 3 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Figure 4 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Viaarxiv icon

Machine Learning for Detecting Data Exfiltration

Add code
Dec 17, 2020
Figure 1 for Machine Learning for Detecting Data Exfiltration
Figure 2 for Machine Learning for Detecting Data Exfiltration
Figure 3 for Machine Learning for Detecting Data Exfiltration
Figure 4 for Machine Learning for Detecting Data Exfiltration
Viaarxiv icon

An Evasion Attack against ML-based Phishing URL Detectors

Add code
May 18, 2020
Figure 1 for An Evasion Attack against ML-based Phishing URL Detectors
Figure 2 for An Evasion Attack against ML-based Phishing URL Detectors
Figure 3 for An Evasion Attack against ML-based Phishing URL Detectors
Figure 4 for An Evasion Attack against ML-based Phishing URL Detectors
Viaarxiv icon