Results 61 to 70 of about 53,867 (205)

Particle Swarm Optimization-Based Feature Weighting for Improving Intelligent Phishing Website Detection

open access: yesIEEE Access, 2020
Over the last few years, web phishing attacks have been constantly evolving causing customers to lose trust in e-commerce and online services. Various tools and systems based on a blacklist of phishing websites are applied to detect the phishing websites.
Waleed Ali, Sharaf Malebary
doaj   +1 more source

From Classroom to Cabinet: Bridging Digital Competency and Organizational Support in Nova Scotia's Public Sector

open access: yesCanadian Public Administration, EarlyView.
Abstract This research examined the relationship between digital competency and perceived organizational support among Nova Scotia public servants and MPA students. Findings revealed a non‐linear developmental progression where reliance on external validation systematically diminished as expertise matures.
Warwick Young, Kristian Suen
wiley   +1 more source

Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]

open access: yes, 2013
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L.   +2 more
core  

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

“I Paid A Bribe”—Lessons and Insights From Crowdsourced Corruption Reporting in India

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Preventing and reducing corruption has proven to be an enormous challenge. An important step in this process is to produce and use good metrics to identify where anti‐corruption resources would be most beneficial. Most measures of corruption, however, rely on surveys of perceptions or bribery incidence.
Ina Kubbe   +2 more
wiley   +1 more source

Characterizing Phishing Threats with Natural Language Processing

open access: yes, 2015
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core   +1 more source

International phishing gangs and operation Phish & Chip [PDF]

open access: yesDigital Evidence and Electronic Signature Law Review, 2014
Francesco Cajani provides an insight to the practical problems when dealing with cross-border crime.
openaire   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network

open access: yesIEEE Access, 2019
Phishing attack is now a big threat to people's daily life and networking environment. Through disguising illegal URLs as legitimate ones, attackers can induce users to visit the phishing URLs to get private information and other benefits.
Erzhou Zhu   +4 more
doaj   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy