Work place: KNIT, Sultanpur, India
E-mail: researchcse19@gmail.com
Website: https://orcid.org/0000-0001-9002-1494
Research Interests: Software Engineering, Computational Learning Theory, Data Mining, Data Structures and Algorithms
Biography
Aasha Singh has completed her M.C.A. degree from KNIT Sultanpur in 2011. She is pursuing her Ph.D. from M.U.I.T. Lucknow. She is presently working as an Assistant Professor in the department of Computer Science & Engineering at KNIT Sultanpur. Her research areas are Machine Learning, Software Engineering, Data Mining. She has 05 Years of teaching/industry experience.
By Aasha Singh Awadhesh Kumar Ajay Kumar Bharti Vaishali Singh
DOI: https://doi.org/10.5815/ijwmt.2022.06.03, Pub. Date: 8 Dec. 2022
On the basis of characteristics derived from IPv4 addresses, this paper offers a method for identifying interaction linked with website-based malware and then modelling a machine-learning-based classifier. In this research work, a modified approach is proposed for detecting fraudulent websites and compared with other methods like SVM assessment of IP addresses, octet-based technique, modified extended version of octet-based technique, and bit string-based characteristics. This modified approach is based on the fact that logical addressing is more reliable and consistent than other measures like URLs and DNS. The characteristic sequence which makes up URLs and domain names are more changeable with respect to IP addresses which are less changeable in comparison to URLs or domain names. The IPv4 address length is encoded into 4-byte space. Here, we have evaluated our modified approach with valid IP addresses from Kaggle [11], published on January 16, 2018, have been used to validate the efficacy of their metho.
[...] Read more.By Aasha Singh Awadhesh Kumar Ajay Kumar Bharti Vaishali Singh
DOI: https://doi.org/10.5815/ijieeb.2022.06.03, Pub. Date: 8 Dec. 2022
Nowadays, we use emails almost in every field; there is not a single day, hour, or minute when emails are not used by people worldwide. Emails can be categorized into two types: ham and spam. Hams are useful emails, while spam is junk or unwanted emails. Spam emails may carry some unwanted, harmful information or viruses with them, which might harm user privacy. Spam mails are used to harm people by wasting their time and energy and stealing valuable information. Due to increasing in spam emails rapidly, spam detection and filtering are the prominent problems that need to be solved. This paper discusses various machine learning models like Naïve Bayes, Support Vector Machine, Decision Tree, Extra Decision Tree, Linear regression., and surveys about these machine learning techniques for email spam detection in terms of their accuracy and precision. In this paper, a comprehensive comparison of these techniques and stacking of different algorithms is also made based on their speed, accuracy, and precision performance.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals