Results 71 to 80 of about 50,838 (183)

Secure Authentication via Quantum Physical Unclonable Functions: A Review

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré   +8 more
wiley   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model

open access: yesHumanities & Social Sciences Communications
Mobile phishing has emerged as one of the most severe cybercrime threats; thus, research must examine the factors affecting people’s likelihood of becoming instant messaging phishing targets.
Chin Lay Gan, Yi Yong Lee, Tze Wei Liew
doaj   +1 more source

PhishDef: URL Names Say It All

open access: yes, 2010
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis   +2 more
core   +2 more sources

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors

open access: yes, 2018
Phishing, a continuously growing cyber threat, aims to obtain innocent users' credentials by deceiving them via presenting fake web pages which mimic their legitimate targets.
Aydos, Murat   +2 more
core   +1 more source

Metaheuristic‐Driven Feature Selection for Blockchain Fraud Detection: A Comparative Study on Machine and Deep Learning Models

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
We present a metaheuristic feature‐selection framework—Artificial Bee Colony, Aquila Optimiser and Fox Optimiser—for blockchain fraud detection, benchmarked across machine‐learning and deep‐learning models on large‐scale transaction data. The study evaluates predictive performance (PR‐AUC/ROC‐AUC), stability across seeds and parsimony under cost ...
Hibatou allah Boulsane, Karim Afdel
wiley   +1 more source

Detecting and characterizing lateral phishing at scale [PDF]

open access: yes, 2019
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A   +7 more
core   +2 more sources

Robustness Analysis of Distributed CNN Model Training in Expression Recognition

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley   +1 more source

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

open access: yes, 2017
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara   +2 more
core  

Home - About - Disclaimer - Privacy