Results 61 to 70 of about 24,070 (256)

Evolutionary Algorithm with Deep Auto Encoder Network Based Website Phishing Detection and Classification

open access: yesApplied Sciences, 2022
Website phishing is a cyberattack that targets online users for stealing their sensitive data containing login credential and banking details. The phishing websites appear very similar to their equivalent legitimate websites for attracting a huge amount ...
Hamed Alqahtani   +7 more
doaj   +1 more source

An Explainable and Carbon‐Aware Stacked Ensemble Model for Phishing and Impersonation Detection in Online Social Networks

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
EcoSecure‐Phish is an explainable, energy‐aware ensemble framework for detecting phishing and impersonation in online social networks. By integrating optimized boosting models with feature selection and sustainability metrics, it achieves high detection accuracy while reducing latency, energy consumption, and carbon impact for scalable, real‐time ...
Romil Rawat   +5 more
wiley   +1 more source

Multimodal framework for phishing attack detection and mitigation through behavior analysis using EM-BERT and SPCA-BASED EAI-SC-LSTM

open access: yesFrontiers in Communications and Networks
IntroductionThe rapid growth of advanced networking causes a significant increase in malicious threats to website data for accessing user information via phishing attacks.
Mahmoud Murhej, G. Nallasivan
doaj   +1 more source

PDGAN: Phishing Detection With Generative Adversarial Networks

open access: yesIEEE Access, 2022
Phishing is a harmful online attack that could lead to identity theft and financial damages. The demand for high-accuracy phishing detection tools has risen due to the increase of online electronic services and payment systems.
Saad Al-Ahmadi   +2 more
doaj   +1 more source

A secure email login system using virtual password [PDF]

open access: yes, 2011
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system.
Doshi, Nishant, Tanti, Bhavin
core   +1 more source

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
SI
Luis Felipe Castaño   +3 more
openaire   +4 more sources

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Classification of Phishing Email Using Random Forest Machine Learning Technique

open access: yesJournal of Applied Mathematics, 2014
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu   +1 more
doaj   +1 more source

Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions

open access: yesIET Networks, 2020
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly.
M. Vijayalakshmi   +3 more
doaj   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy