Results 91 to 100 of about 24,070 (256)
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem +4 more
wiley +1 more source
ABSTRACT We take an extended perspective on project success that includes post‐project outcomes as well as at‐end and during‐project success. To manage projects accordingly, we conceptualize three corresponding orders of uncertainty (outcomes, deliverables, and means uncertainties).
Philip Cash +2 more
wiley +1 more source
Behind the Bait: Delving into PhishTank's hidden data
Phishing constitutes a form of social engineering that aims to deceive individuals through email communication. Extensive prior research has underscored phishing as one of the most commonly employed attack vectors for infiltrating organizational networks.
Affan Yasin +3 more
doaj +1 more source
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara +2 more
core
Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Ekerstad, Niklas +2 more
core +1 more source
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama +2 more
core +1 more source
Phishing attack is now a big threat to people's daily life and networking environment. Through disguising illegal URLs as legitimate ones, attackers can induce users to visit the phishing URLs to get private information and other benefits.
Erzhou Zhu +4 more
doaj +1 more source
Life-long phishing attack detection using continual learning. [PDF]
Ejaz A, Mian AN, Manzoor S.
europepmc +1 more source
A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning. [PDF]
Shaukat MW +4 more
europepmc +1 more source

