A URL with Image-based Feature Extraction for Preventing Phishing Attacks
Currently, Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity.
Dyaa Eldeen Nasr Motawa +1 more
doaj +1 more source
Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L. +2 more
core
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks [PDF]
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer issues a challenge to the user over a network, in this case, the user issues a challenge to the computer.
Rachna Dhamija, J. D. Tygar
openaire +1 more source
Cloud-based email phishing attack using machine and deep learning algorithm. [PDF]
Butt UA +5 more
europepmc +1 more source
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad +6 more
doaj +1 more source
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. [PDF]
Abbas SG +7 more
europepmc +1 more source
Investigation of Attitudes Towards Security Behaviors [PDF]
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core +1 more source
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms [PDF]
Claudio Marforio +4 more
openalex +1 more source
Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services [PDF]
Sayak Saha Roy +2 more
openalex +1 more source
PHISHING ATTACKS, AS A FAVOURABLE CONDITION FOR TERRORIST ACTIVITIES
Ioana-Raluca Rusu
openalex +2 more sources

