Results 81 to 90 of about 24,070 (256)

Types of anti-phishing solutions for phishing attack

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Abstract Nowadays, many people use Internet to do online activity. This scenario exposed them to danger in Internet which is phishing attack. In order to solve phishing attack, the anti-phishing solutions are needed. Based on our review, there are still lacks of articles that review on the types of anti-phishing solutions in detail.
Siti Hawa Apandi   +2 more
openaire   +1 more source

Cybersecurity Assurance for SMEs: A Conceptual Framework Integrating Organizational Culture, Fraud Risk Management and Forensic Accounting

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, Volume 43, Issue 1, March 2026.
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo   +4 more
wiley   +1 more source

A Survey on Phishing Attacks

open access: yesInternational Journal of Computer Applications, 2014
the last few years a large number of internet users are increasing additionally different companies, banks and service providers are providing services online. So various sensitive and financial data are becomes online now in these days. This aspect of internet users are an evolution for us but the dark side of this advantage is too hard to accept ...
Jigyasu Dubey, Krutika RaniSahu
openaire   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]

open access: yes, 2018
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core  

The Highly Insidious Extreme Phishing Attacks [PDF]

open access: yes2016 25th International Conference on Computer Communication and Networks (ICCCN), 2016
One of the most severe and challenging threats to Internet security is phishing, which uses spoofed websites to steal users' passwords and online identities. Phishers mainly use spoofed emails or instant messages to lure users to the phishing websites.
Rui Zhao 0005   +7 more
openaire   +1 more source

Artificial Intelligence in Multimedia Content Generation: A Review of Audio and Video Synthesis Techniques

open access: yesJournal of the Society for Information Display, Volume 34, Issue 2, Page 49-67, February 2026.
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley   +1 more source

An Evasion Attack against ML-based Phishing URL Detectors

open access: yes, 2020
Background: Over the year, Machine Learning Phishing URL classification (MLPU) systems have gained tremendous popularity to detect phishing URLs proactively. Despite this vogue, the security vulnerabilities of MLPUs remain mostly unknown. Aim: To address
Babar, M. Ali, Gaire, Raj, Sabir, Bushra
core  

A Literature Survey on Potential Private User Information Leakage in Metaverse Applications

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 1, January 2026.
This survey explores potential privacy risks in the Metaverse, focusing on personal data inferred from virtual reality headsets embedded with passive brain‐computer interfaces (BCI). It reviews how age, gender, and ethnicity can be predicted using neurophysiological signals, (e.g., electroencephalogram). The survey also explores future threats from non‐
Mina Jaberi, Tiago H. Falk
wiley   +1 more source

Design of Efficient Phishing Detection Model using Machine Learning

open access: yesTehnički Glasnik
Recently, there have been cases of phishing attempts to steal personal information through fake sites disguised as major sites. Although phishing attacks continue and increase, countermeasures remain in the form of defense after identifying the attack ...
Bong-Hyun Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy