Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{147971,
author = {Kelsang Dorjee and Dinesh Reddy and Rahul Shindey and R.Veeramani},
title = {URL phishing Analysis},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {5},
number = {11},
pages = {671-674},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=147971},
abstract = {Malicious internet sites for the most part to implement expansion of net bad activities and restriction the event of the internet activities. Due to which, it has been robust changes to develop general resolution to pause the user from reaching various internet sites. We have a tendency to create a studying based mostly approach to classifying internet sites into three classes: Benign, Spam and Malicious. Our steps solely analyzes the Uniform Resource locater (URL) itself while not accessing the content of internet sites.},
keywords = {Bengin,Spam,Malware},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry