Now 439 visitors
Today:178 Yesterday:1517
Total: 1978 395S 104P 50R
2025-12-16, Week 51
Member Login
Welcome Message
Statistics
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration / Invoice
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20230129 Question.2
Questioner: nvlinh@cs.ccu.edu.tw    2023-02-20 ¿ÀÈÄ 5:54:54
IEEE/ICACT20230129 Answer.2
Answer by Auhor h22001iy@edu.tuis.ac.jp   2023-02-20 ¿ÀÈÄ 5:54:54
What are your contributions? You may consider comparing the system performance with the other studies Thank you for your question. The main contributions are as follows: (1) DNS graphs of domain names and IP addresses belonging to HTTPS-enabled phishing websites were constructed and analyzed. (2) The primary differences between the DNS graphs of benign and phishing websites are the mean number of nodes per component, and that of the average node degree per component. (3) With regard to the clustering coefficient, few differences were observed between the benign and phishing websites corresponding to components with 10 or more nodes. For this study, we only conducted analysis and did not compare our results with other methods. We plan to address this as a future work. Thank you.

Select Voice