Results 11 to 20 of about 50,838 (183)

Improving the phishing website detection using empirical analysis of Function Tree and its variants

open access: yesHeliyon, 2021
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun   +10 more
doaj   +1 more source

Phishing [PDF]

open access: yesDatenschutz und Datensicherheit - DuD, 2021
Abstract— Phishing is a cyber-attack that involves posing as a trustworthy source and obtaining confidential or private data. Phishers also take advantage of users' interest in a site's appearance by using web pages that appear to be authentic. Data acquired could be then used for fraudulent activities.
Joe Joseph, Jisnon Devis
openaire   +2 more sources

Avoiding the Hook: Influential Factors of Phishing Awareness Training on Click-Rates and a Data-Driven Approach to Predict Email Difficulty Perception

open access: yesIEEE Access, 2022
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This study conducted a large-scale anti-phishing training with more
Thomas Sutter   +3 more
doaj   +1 more source

Demystifying the Regional Phishing Landscape in South Korea

open access: yesIEEE Access, 2023
The ever-increasing phishing campaigns around the globe have been one of the main threats to cyber security. In response, the global anti-phishing entity (e. g., APWG) collectively maintains the up-to-date blacklist database (e.
Hyunjun Park   +4 more
doaj   +1 more source

E-mail-Based Phishing Attack Taxonomy

open access: yesApplied Sciences, 2020
The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing.
Justinas Rastenis   +5 more
doaj   +1 more source

A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

open access: yesWasit Journal for Pure Sciences, 2023
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili   +1 more
doaj   +1 more source

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis [PDF]

open access: yes, 2020
Recently, the development and implementation of phishing attacks require little technical skills and costs. This uprising has led to an ever-growing number of phishing attacks on the World Wide Web.
Chen, Yingke, Opara, Chidimma, Wei, Bo
core   +2 more sources

PhiDMA – A phishing detection model with multi-filter approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site.
Gunikhan Sonowal, K.S. Kuppusamy
doaj   +1 more source

PHISHING

open access: yesinternational journal of engineering technology and management sciences, 2022
In the discipline of computer protection, phishing is the criminally fraudulent method of trying to gather sensitive statistics together with usernames, passwords and credit card information, by way of masquerading as a truthful entity in an digital attempting to accumulate touchy information which includes usernames, passwords and credit card ...
null Alphiya Yunoose   +4 more
openaire   +1 more source

High Accuracy Phishing Detection Based on Convolutional Neural Networks [PDF]

open access: yes, 2020
The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber-attacks.
Alzaylaee, Mohammed K.   +1 more
core   +2 more sources

Home - About - Disclaimer - Privacy