Results 91 to 100 of about 1,061,727 (224)
Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks
The URL components of web addresses are frequently used in creating phishing detection techniques. Typically, machine learning techniques are widely used to identify anomalous patterns in URLs as signs of possible phishing.
Ahmed Aleroud, George Karabatis
semanticscholar +1 more source
Robustness Analysis of Distributed CNN Model Training in Expression Recognition
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley +1 more source
DeltaPhish: Detecting Phishing Webpages in Compromised Websites
The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting.
AY Fu +17 more
core +1 more source
Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa +6 more
wiley +1 more source
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
Investigation of Phishing Susceptibility with Explainable Artificial Intelligence
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective ...
Zhengyang Fan +3 more
doaj +1 more source
Anti-phishing as a web-based user service [PDF]
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core
Phishing, as a social engineering attack has become an increasing threat to organizations in cyberspace. To prevent this, a well-designed continuous security training and educational program needs to be established and enforced in organizations.
Hamidreza Shahbaznezhad +2 more
semanticscholar +1 more source
This study presents a comprehensive analysis of system resilience and recovery in the face of cyber attacks on a hydrogen energy infrastructure, utilizing advanced modelling techniques and state‐of‐the‐art cybersecurity strategies. We developed a robust optimization framework integrated with graph neural networks (GNNs) to detect and mitigate ...
Dong Hua +3 more
wiley +1 more source
Detection of APTs by Machine Learning: A Performance Comparison
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela +5 more
wiley +1 more source

