Results 91 to 100 of about 24,070 (256)

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

One Step Forward, Two Steps Back: Managing Uncertainties in Outcomes, Deliverables, and Means in Behavioral Intervention Development Projects

open access: yesJournal of Operations Management, Volume 72, Issue 1, Page 81-107, January 2026.
ABSTRACT We take an extended perspective on project success that includes post‐project outcomes as well as at‐end and during‐project success. To manage projects accordingly, we conceptualize three corresponding orders of uncertainty (outcomes, deliverables, and means uncertainties).
Philip Cash   +2 more
wiley   +1 more source

Behind the Bait: Delving into PhishTank's hidden data

open access: yesData in Brief
Phishing constitutes a form of social engineering that aims to deceive individuals through email communication. Extensive prior research has underscored phishing as one of the most commonly employed attack vectors for infiltrating organizational networks.
Affan Yasin   +3 more
doaj   +1 more source

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

open access: yes, 2017
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara   +2 more
core  

Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]

open access: yes, 2005
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Ekerstad, Niklas   +2 more
core   +1 more source

bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

open access: yes, 2014
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama   +2 more
core   +1 more source

OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network

open access: yesIEEE Access, 2019
Phishing attack is now a big threat to people's daily life and networking environment. Through disguising illegal URLs as legitimate ones, attackers can induce users to visit the phishing URLs to get private information and other benefits.
Erzhou Zhu   +4 more
doaj   +1 more source

A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning. [PDF]

open access: yesSensors (Basel), 2023
Shaukat MW   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy