Results 41 to 50 of about 24,070 (256)

Phishing Website Detection Using Machine Learning: A Review

open access: yesWasit Journal for Pure Sciences, 2023
Phishing, a form of cyber attack in which perpetrators employ fraudulent websites or emails to Deceive individuals into divulging sensitive information such as passwords or financial data, can be mitigated through various machine-learning algorithms for
marwa al saedi, Nahla Abbas Flayh
doaj   +1 more source

Toward a phishing attack ontology. [PDF]

open access: yes, 2023
Phishing attacks are the most common form of social engineering where attackers intend to deceive targeted people into revealing sensitive information or installing malware. To understand the dynamics of phishing attacks and design suitable countermeasures, particularly the promotion of phishing awareness, cybersecurity researchers have proposed ...
Oliveira, Ítalo   +2 more
openaire   +1 more source

The innocent hill walker [PDF]

open access: yes, 2012
Criminals are going to ever more extreme lengths to get access to company systems and home computers, according to Les Ball and Natalie ...
Ball, Les, Coull, Natalie
core   +3 more sources

Study on Phishing Attacks

open access: yes, 2021
Abstract: The Internet has a remarkable platform for common people communication. People with criminal mind have found a way of stealing personal information without actually meeting them and with the least risk of being caught. It`s far known as Phishing.  Phishing poses a big danger to the e-commerce enterprise.
Josmy Joseph, Merin Manoj
openaire   +1 more source

Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study

open access: yesAlgorithms, 2023
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the ...
Kunj Joshi   +6 more
doaj   +1 more source

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment

open access: yesAlexandria Engineering Journal
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy