Results 1 to 10 of about 1,061,727 (224)

Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

open access: yesFrontiers in Computer Science, 2021
With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become vulnerable to cybercriminals.
Zainab Alkhalil   +3 more
doaj   +2 more sources

A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks

open access: yesIEEE Access, 2023
Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails.
Sultan Asiri   +4 more
doaj   +2 more sources

Identification of Phishing Attacks using Machine Learning Algorithm [PDF]

open access: yesE3S Web of Conferences, 2023
Phishing is a particular type of cybercrime that allows criminals to trick people and steal crucial data. The phishing assault has developed into a more complex attack vector since the first instance was published in 1990.
P.M Dinesh   +5 more
doaj   +2 more sources

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

open access: yesFuture Internet, 2020
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj   +2 more sources

Phishing attacks root causes [PDF]

open access: yes, 2018
Nowadays, many people are losing considerable wealth due to online scams. Phishing is one of the means that a scammer can use to deceitfully obtain the victim’s personal identification, bank account information, or any other sensitive data. There are a number of anti-phishing techniques and tools in place, but unfortunately phishing still works. One of
Abroshan, Hossein   +3 more
core   +4 more sources

Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks

open access: yesFuture Internet, 2022
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited.
Emtethal K. Alamri   +2 more
doaj   +2 more sources

Heuristic machine learning approaches for identifying phishing threats across web and email platforms [PDF]

open access: yesFrontiers in Artificial Intelligence
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat.
Ramprasath Jayaprakash   +8 more
doaj   +2 more sources

A review of organization-oriented phishing research [PDF]

open access: yesPeerJ Computer Science
The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users ...
Kholoud Althobaiti, Nawal Alsufyani
doaj   +3 more sources

Improving the phishing website detection using empirical analysis of Function Tree and its variants

open access: yesHeliyon, 2021
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun   +10 more
doaj   +1 more source

Survey on phishing detection research

open access: yes网络与信息安全学报, 2020
With the continuous development of the internet, the threat posed by phishing to people's daily lives is increasing. As a core security technology against phishing attacks, phishing detection technology can help people effectively avoid security threats ...
FU Xi, LI Hui, ZHAO Xingwen
doaj   +3 more sources

Home - About - Disclaimer - Privacy