Results 61 to 70 of about 50,838 (183)

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Phishing suspiciousness in older and younger adults: The role of executive functioning.

open access: yesPLoS ONE, 2017
Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, with such goals as financial or identity theft.
Brandon E Gavett   +5 more
doaj   +1 more source

Survey on Ethereum phishing detection technology

open access: yes网络与信息安全学报, 2023
With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high ...
Zhao CAI, Tao JING, Shuang REN
doaj   +1 more source

Artificial Intelligence in Multimedia Content Generation: A Review of Audio and Video Synthesis Techniques

open access: yesJournal of the Society for Information Display, Volume 34, Issue 2, Page 49-67, February 2026.
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley   +1 more source

Indonesian SMEs and Cybersecurity: Developing Instrument to Test SMEs Owners’ Capability in Detecting Phishing Emails

open access: yesRiset Akuntansi dan Keuangan Indonesia
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati   +2 more
doaj   +1 more source

Analyzing Social and Stylometric Features to Identify Spear phishing Emails

open access: yes, 2014
Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise ...
Dewan, Prateek   +2 more
core   +1 more source

A Literature Survey on Potential Private User Information Leakage in Metaverse Applications

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 1, January 2026.
This survey explores potential privacy risks in the Metaverse, focusing on personal data inferred from virtual reality headsets embedded with passive brain‐computer interfaces (BCI). It reviews how age, gender, and ethnicity can be predicted using neurophysiological signals, (e.g., electroencephalogram). The survey also explores future threats from non‐
Mina Jaberi, Tiago H. Falk
wiley   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

One Step Forward, Two Steps Back: Managing Uncertainties in Outcomes, Deliverables, and Means in Behavioral Intervention Development Projects

open access: yesJournal of Operations Management, Volume 72, Issue 1, Page 81-107, January 2026.
ABSTRACT We take an extended perspective on project success that includes post‐project outcomes as well as at‐end and during‐project success. To manage projects accordingly, we conceptualize three corresponding orders of uncertainty (outcomes, deliverables, and means uncertainties).
Philip Cash   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy