Results 1 to 10 of about 27,296 (205)

Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment

open access: yesAlexandria Engineering Journal
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri   +7 more
doaj   +1 more source

Combining Long-Term Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML

open access: yesIEEE Access, 2022
Phishing, a well-known cyber-attack practice has gained significant research attention in the cyber-security domain for the last two decades due to its dynamic attacking strategies.
Subhash Ariyadasa   +2 more
doaj   +1 more source

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
SI
Luis Felipe Castaño   +3 more
openaire   +4 more sources

Phishing Attack and their Prevention

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2022
Abstract— The paper includes comparison and analysis of various hacking attacks and will propose some preventive measures to it, Cyber security is an important field of computer science, which deals with securing data, system and deals with complex data securing algorithms like encryption decryption. Keywords—Cyber security, hacking attacks, encryption,
openaire   +1 more source

Anti-phishing as a web-based user service [PDF]

open access: yes, 2006
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core  

Heuristic machine learning approaches for identifying phishing threats across web and email platforms

open access: yesFrontiers in Artificial Intelligence
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat.
Ramprasath Jayaprakash   +8 more
doaj   +1 more source

Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]

open access: yes, 2013
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L.   +2 more
core  

Investigation of Phishing Susceptibility with Explainable Artificial Intelligence

open access: yesFuture Internet
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective ...
Zhengyang Fan   +3 more
doaj   +1 more source

Types of anti-phishing solutions for phishing attack

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Abstract Nowadays, many people use Internet to do online activity. This scenario exposed them to danger in Internet which is phishing attack. In order to solve phishing attack, the anti-phishing solutions are needed. Based on our review, there are still lacks of articles that review on the types of anti-phishing solutions in detail.
Siti Hawa Apandi   +2 more
openaire   +1 more source

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

open access: yesJournal of Medical Internet Research, 2020
BackgroundPhishing is a cybercrime in which the attackers usually impersonate a trusted source. The attackers usually send an email that contains a link that allows them to steal the receiver’s personal information.
Abdelhamid, Mohamed
doaj   +1 more source

Home - About - Disclaimer - Privacy