Results 121 to 130 of about 53,867 (205)

Phishing

open access: yes, 2013
This study deals with the criminal scheme known as “Phishing”. In the first part of the study a technical analysis of Phishing serves to identify the operational variants of this scheme and the probable victims of this type of attack; in the second part, the scheme is legally decomposed, wi± the indication of the catalog of criminal offenses underlying
openaire   +1 more source

Improving phishing email detection performance through deep learning with adaptive optimization. [PDF]

open access: yesSci Rep
Hosseinzadeh M   +7 more
europepmc   +1 more source

Lightweight malicious URL detection using deep learning and large language models. [PDF]

open access: yesSci Rep
Kibriya H   +5 more
europepmc   +1 more source

Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]

open access: yesFront Big Data
Nauman M   +4 more
europepmc   +1 more source

A multi-dimensional DNS domain intelligence dataset for cybersecurity research. [PDF]

open access: yesData Brief
Hranický R   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy