Results 101 to 110 of about 24,070 (256)

A URL with Image-based Feature Extraction for Preventing Phishing Attacks

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Currently, Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity.
Dyaa Eldeen Nasr Motawa   +1 more
doaj   +1 more source

Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]

open access: yes, 2013
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L.   +2 more
core  

Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks [PDF]

open access: yes, 2005
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer issues a challenge to the user over a network, in this case, the user issues a challenge to the computer.
Rachna Dhamija, J. D. Tygar
openaire   +1 more source

Cloud-based email phishing attack using machine and deep learning algorithm. [PDF]

open access: yesComplex Intell Systems, 2023
Butt UA   +5 more
europepmc   +1 more source

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

open access: yesIEEE Open Journal of the Communications Society
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad   +6 more
doaj   +1 more source

Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. [PDF]

open access: yesSensors (Basel), 2021
Abbas SG   +7 more
europepmc   +1 more source

Investigation of Attitudes Towards Security Behaviors [PDF]

open access: yes, 2018
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core   +1 more source

Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms [PDF]

open access: green, 2015
Claudio Marforio   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy