Results 91 to 100 of about 1,061,727 (224)

Bypassing Detection of URL-based Phishing Attacks Using Generative Adversarial Deep Neural Networks

open access: yesIWSPA@CODASPY, 2020
The URL components of web addresses are frequently used in creating phishing detection techniques. Typically, machine learning techniques are widely used to identify anomalous patterns in URLs as signs of possible phishing.
Ahmed Aleroud, George Karabatis
semanticscholar   +1 more source

Robustness Analysis of Distributed CNN Model Training in Expression Recognition

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley   +1 more source

DeltaPhish: Detecting Phishing Webpages in Compromised Websites

open access: yes, 2017
The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting.
AY Fu   +17 more
core   +1 more source

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

Investigation of Phishing Susceptibility with Explainable Artificial Intelligence

open access: yesFuture Internet
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective ...
Zhengyang Fan   +3 more
doaj   +1 more source

Anti-phishing as a web-based user service [PDF]

open access: yes, 2006
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core  

Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?

open access: yesJournal of Computational Information Systems, 2020
Phishing, as a social engineering attack has become an increasing threat to organizations in cyberspace. To prevent this, a well-designed continuous security training and educational program needs to be established and enforced in organizations.
Hamidreza Shahbaznezhad   +2 more
semanticscholar   +1 more source

Enhancing Cybersecurity in Hydrogen Energy Systems: Integrating Graph Neural Networks and Stochastic Dual Dynamic Programming

open access: yesIET Renewable Power Generation, Volume 20, Issue 1, January/December 2026.
This study presents a comprehensive analysis of system resilience and recovery in the face of cyber attacks on a hydrogen energy infrastructure, utilizing advanced modelling techniques and state‐of‐the‐art cybersecurity strategies. We developed a robust optimization framework integrated with graph neural networks (GNNs) to detect and mitigate ...
Dong Hua   +3 more
wiley   +1 more source

Detection of APTs by Machine Learning: A Performance Comparison

open access: yesExpert Systems, Volume 43, Issue 1, January 2026.
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy