Results 101 to 110 of about 52,374 (182)

Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment

open access: yesAlexandria Engineering Journal
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri   +7 more
doaj   +1 more source

Investigation of Phishing Susceptibility with Explainable Artificial Intelligence

open access: yesFuture Internet
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective ...
Zhengyang Fan   +3 more
doaj   +1 more source

The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia

open access: yesSoshum: Jurnal Sosial dan Humaniora
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani   +2 more
doaj   +1 more source

Multimodal Phishing Detection on Social Networking Sites: A Systematic Review

open access: yesIEEE Access
Phishing is one of the most common cyberattacks, with the number of incidents increasing annually. Significant research interests have been generated in phishing emails, URLs, and websites over the past decade.
Tandin Wangchuk, Tad Gonsalves
doaj   +1 more source

BadDomains: Early Detection of Phishing Domains Registration. [PDF]

open access: yesSensors (Basel)
Seweryn K   +2 more
europepmc   +1 more source

PhishNet 1.0: optuna-optimized stacking ensemble with Boruta-based feature selection for phishing URL detection. [PDF]

open access: yesSci Rep
Jain A   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy