Alert button
Picture for Raj Gaire

Raj Gaire

Alert button

CSIROs Data61

Profiler: Profile-Based Model to Detect Phishing Emails

Add code
Bookmark button
Alert button
Aug 18, 2022
Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal

Figure 1 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 2 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 3 for Profiler: Profile-Based Model to Detect Phishing Emails
Figure 4 for Profiler: Profile-Based Model to Detect Phishing Emails
Viaarxiv icon

Towards Web Phishing Detection Limitations and Mitigation

Add code
Bookmark button
Alert button
Apr 03, 2022
Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Towards Web Phishing Detection Limitations and Mitigation
Figure 2 for Towards Web Phishing Detection Limitations and Mitigation
Figure 3 for Towards Web Phishing Detection Limitations and Mitigation
Figure 4 for Towards Web Phishing Detection Limitations and Mitigation
Viaarxiv icon

Characterizing Malicious URL Campaigns

Add code
Bookmark button
Alert button
Aug 29, 2021
Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Raj Gaire, Seyit Camtepe, Surya Nepal

Figure 1 for Characterizing Malicious URL Campaigns
Figure 2 for Characterizing Malicious URL Campaigns
Figure 3 for Characterizing Malicious URL Campaigns
Figure 4 for Characterizing Malicious URL Campaigns
Viaarxiv icon

ReinforceBug: A Framework to Generate Adversarial Textual Examples

Add code
Bookmark button
Alert button
Mar 11, 2021
Bushra Sabir, M. Ali Babar, Raj Gaire

Figure 1 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Figure 2 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Figure 3 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Figure 4 for ReinforceBug: A Framework to Generate Adversarial Textual Examples
Viaarxiv icon

Machine Learning for Detecting Data Exfiltration

Add code
Bookmark button
Alert button
Dec 17, 2020
Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire

Figure 1 for Machine Learning for Detecting Data Exfiltration
Figure 2 for Machine Learning for Detecting Data Exfiltration
Figure 3 for Machine Learning for Detecting Data Exfiltration
Figure 4 for Machine Learning for Detecting Data Exfiltration
Viaarxiv icon

An Evasion Attack against ML-based Phishing URL Detectors

Add code
Bookmark button
Alert button
May 18, 2020
Bushra Sabir, M. Ali Babar, Raj Gaire

Figure 1 for An Evasion Attack against ML-based Phishing URL Detectors
Figure 2 for An Evasion Attack against ML-based Phishing URL Detectors
Figure 3 for An Evasion Attack against ML-based Phishing URL Detectors
Figure 4 for An Evasion Attack against ML-based Phishing URL Detectors
Viaarxiv icon