Results 11 to 20 of about 50,838 (183)
Improving the phishing website detection using empirical analysis of Function Tree and its variants
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun +10 more
doaj +1 more source
Abstract— Phishing is a cyber-attack that involves posing as a trustworthy source and obtaining confidential or private data. Phishers also take advantage of users' interest in a site's appearance by using web pages that appear to be authentic. Data acquired could be then used for fraudulent activities.
Joe Joseph, Jisnon Devis
openaire +2 more sources
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This study conducted a large-scale anti-phishing training with more
Thomas Sutter +3 more
doaj +1 more source
Demystifying the Regional Phishing Landscape in South Korea
The ever-increasing phishing campaigns around the globe have been one of the main threats to cyber security. In response, the global anti-phishing entity (e. g., APWG) collectively maintains the up-to-date blacklist database (e.
Hyunjun Park +4 more
doaj +1 more source
E-mail-Based Phishing Attack Taxonomy
The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing.
Justinas Rastenis +5 more
doaj +1 more source
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili +1 more
doaj +1 more source
HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis [PDF]
Recently, the development and implementation of phishing attacks require little technical skills and costs. This uprising has led to an ever-growing number of phishing attacks on the World Wide Web.
Chen, Yingke, Opara, Chidimma, Wei, Bo
core +2 more sources
PhiDMA – A phishing detection model with multi-filter approach
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site.
Gunikhan Sonowal, K.S. Kuppusamy
doaj +1 more source
In the discipline of computer protection, phishing is the criminally fraudulent method of trying to gather sensitive statistics together with usernames, passwords and credit card information, by way of masquerading as a truthful entity in an digital attempting to accumulate touchy information which includes usernames, passwords and credit card ...
null Alphiya Yunoose +4 more
openaire +1 more source
High Accuracy Phishing Detection Based on Convolutional Neural Networks [PDF]
The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber-attacks.
Alzaylaee, Mohammed K. +1 more
core +2 more sources

