Results 71 to 80 of about 50,838 (183)
Secure Authentication via Quantum Physical Unclonable Functions: A Review
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré +8 more
wiley +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Mobile phishing has emerged as one of the most severe cybercrime threats; thus, research must examine the factors affecting people’s likelihood of becoming instant messaging phishing targets.
Chin Lay Gan, Yi Yong Lee, Tze Wei Liew
doaj +1 more source
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis +2 more
core +2 more sources
Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Phishing, a continuously growing cyber threat, aims to obtain innocent users' credentials by deceiving them via presenting fake web pages which mimic their legitimate targets.
Aydos, Murat +2 more
core +1 more source
We present a metaheuristic feature‐selection framework—Artificial Bee Colony, Aquila Optimiser and Fox Optimiser—for blockchain fraud detection, benchmarked across machine‐learning and deep‐learning models on large‐scale transaction data. The study evaluates predictive performance (PR‐AUC/ROC‐AUC), stability across seeds and parsimony under cost ...
Hibatou allah Boulsane, Karim Afdel
wiley +1 more source
Detecting and characterizing lateral phishing at scale [PDF]
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A +7 more
core +2 more sources
Robustness Analysis of Distributed CNN Model Training in Expression Recognition
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley +1 more source
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara +2 more
core

