Results 1 to 10 of about 50,838 (183)

LegitPhish: A large-scale annotated dataset for URL-based phishing detectionMendeley Data [PDF]

open access: yesData in Brief
Phishing attacks are a major cybersecurity threat, requiring timely detection using reliable datasets. We present LegitPhish, a novel and manually verified dataset of phishing and legitimate URLs, designed to facilitate research in machine learning-based
Rachana S. Potpelwar   +2 more
doaj   +2 more sources

A review of organization-oriented phishing research [PDF]

open access: yesPeerJ Computer Science
The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users ...
Kholoud Althobaiti, Nawal Alsufyani
doaj   +3 more sources

Dr. Phish: Phishing Website Detector [PDF]

open access: yesE3S Web of Conferences, 2021
Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data. This paper deals with methods for detecting phishing websites by analyzing various features of URLs by Machine learning techniques.
Kumar Harish   +4 more
openaire   +3 more sources

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano   +3 more
doaj   +1 more source

Identification of Phishing Attacks using Machine Learning Algorithm [PDF]

open access: yesE3S Web of Conferences, 2023
Phishing is a particular type of cybercrime that allows criminals to trick people and steal crucial data. The phishing assault has developed into a more complex attack vector since the first instance was published in 1990.
P.M Dinesh   +5 more
doaj   +1 more source

Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

open access: yesFrontiers in Computer Science, 2021
With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become vulnerable to cybercriminals.
Zainab Alkhalil   +3 more
doaj   +1 more source

Survey on phishing detection research

open access: yes网络与信息安全学报, 2020
With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats ...
Xi FU, Hui LI, Xingwen ZHAO
doaj   +3 more sources

A Survey of Machine Learning-Based Solutions for Phishing Website Detection

open access: yesMachine Learning and Knowledge Extraction, 2021
With the development of the Internet, network security has aroused people’s attention. It can be said that a secure network environment is a basis for the rapid and sound development of the Internet. Phishing is an essential class of cybercriminals which
Lizhen Tang, Qusay H. Mahmoud
doaj   +1 more source

Heads-up! An alert and warning system for phishing emails [PDF]

open access: yesOrganizational Cybersecurity Journal, 2021
Purpose – This study introduces the concept of audiovisual alerts and warnings as a way to reduce phishing susceptibility on mobile devices. Design/methodology/approach – This study has three phases.
Molly Cooper   +3 more
doaj   +1 more source

Phishing-Inspector: Detection & Prevention of Phishing Websites [PDF]

open access: yesITM Web of Conferences, 2020
With a tremendous boost in technologies & available learning material developing any website has become very easy. Due to this the number of websites are exponentially growing day by day. The traditional approach of comparing websites with Blacklist and whitelist is not so efficient.
Doke Tanmay   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy