Results 1 to 10 of about 1,061,727 (224)
Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become vulnerable to cybercriminals.
Zainab Alkhalil +3 more
doaj +2 more sources
A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails.
Sultan Asiri +4 more
doaj +2 more sources
Identification of Phishing Attacks using Machine Learning Algorithm [PDF]
Phishing is a particular type of cybercrime that allows criminals to trick people and steal crucial data. The phishing assault has developed into a more complex attack vector since the first instance was published in 1990.
P.M Dinesh +5 more
doaj +2 more sources
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj +2 more sources
Phishing attacks root causes [PDF]
Nowadays, many people are losing considerable wealth due to online scams. Phishing is one of the means that a scammer can use to deceitfully obtain the victim’s personal identification, bank account information, or any other sensitive data. There are a number of anti-phishing techniques and tools in place, but unfortunately phishing still works. One of
Abroshan, Hossein +3 more
core +4 more sources
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited.
Emtethal K. Alamri +2 more
doaj +2 more sources
Heuristic machine learning approaches for identifying phishing threats across web and email platforms [PDF]
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat.
Ramprasath Jayaprakash +8 more
doaj +2 more sources
A review of organization-oriented phishing research [PDF]
The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users ...
Kholoud Althobaiti, Nawal Alsufyani
doaj +3 more sources
Improving the phishing website detection using empirical analysis of Function Tree and its variants
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun +10 more
doaj +1 more source
Survey on phishing detection research
With the continuous development of the internet, the threat posed by phishing to people's daily lives is increasing. As a core security technology against phishing attacks, phishing detection technology can help people effectively avoid security threats ...
FU Xi, LI Hui, ZHAO Xingwen
doaj +3 more sources

