Results 41 to 50 of about 53,867 (205)

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites

open access: yesIEEE Access, 2020
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet.
Yazan Ahmad Alsariera   +3 more
doaj   +1 more source

Classification of Phishing Email Using Random Forest Machine Learning Technique

open access: yesJournal of Applied Mathematics, 2014
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu   +1 more
doaj   +1 more source

The Game of Phishing

open access: yesInternational Journal on Cryptography and Information Security, 2018
ABSTRACT The current implementation of TLS involves your browser displaying a padlock, and a green bar, after successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your browser's response to successful verification of a TLS certificate is to display a login window.
openaire   +2 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

open access: yesFuture Internet, 2020
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

A phishing attack awareness framework for a South African University of Technology

open access: yesSouth African Journal of Information Management
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb   +2 more
doaj   +1 more source

A Method for Domain Detection and Web Page Analysis Targeting Web3 Phishing Websites [PDF]

open access: yesJisuanji gongcheng
As the paradigm of ″decentralized next-generation Internet,″ Web3, relying on blockchain technology, has become an emerging field with great potential in the digital intelligence service ecosystem. However, Web3 phishing websites pose a serious threat to
LIU Ronglong, LI Ziwei, WAN Yue, WU Jiajing, JIANG Zigui
doaj   +1 more source

Home - About - Disclaimer - Privacy