Results 1 to 10 of about 28,445 (242)

Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs) [PDF]

open access: green, 2020
The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites.
Lukáš Halgaš   +2 more
openalex   +4 more sources

A phishing attack awareness framework for a South African University of Technology

open access: goldSouth African Journal of Information Management
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb   +2 more
doaj   +3 more sources

A review of organization-oriented phishing research [PDF]

open access: yesPeerJ Computer Science
The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users ...
Kholoud Althobaiti, Nawal Alsufyani
doaj   +3 more sources

Identification of Phishing Attacks using Machine Learning Algorithm [PDF]

open access: yesE3S Web of Conferences, 2023
Phishing is a particular type of cybercrime that allows criminals to trick people and steal crucial data. The phishing assault has developed into a more complex attack vector since the first instance was published in 1990.
P.M Dinesh   +5 more
doaj   +1 more source

A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks

open access: yesIEEE Access, 2023
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails.
Sultan Asiri   +4 more
doaj   +1 more source

Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

open access: yesFrontiers in Computer Science, 2021
With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become vulnerable to cybercriminals.
Zainab Alkhalil   +3 more
doaj   +1 more source

Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks

open access: yesFuture Internet, 2022
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited.
Emtethal K. Alamri   +2 more
doaj   +1 more source

Improving the phishing website detection using empirical analysis of Function Tree and its variants

open access: yesHeliyon, 2021
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun   +10 more
doaj   +1 more source

Survey on phishing detection research

open access: yes网络与信息安全学报, 2020
With the continuous development of the internet, the threat posed by phishing to people's daily lives is increasing. As a core security technology against phishing attacks, phishing detection technology can help people effectively avoid security threats ...
FU Xi, LI Hui, ZHAO Xingwen
doaj   +3 more sources

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

open access: yesFuture Internet, 2020
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj   +1 more source

Home - About - Disclaimer - Privacy