Results 101 to 110 of about 27,296 (205)

An application for predicting phishing attacks: A case of implementing a support vector machine learning model

open access: yesCyber Security and Applications
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable users into divulging confidential data like medical ...
Emmanuel Song Shombot   +3 more
doaj   +1 more source

Towards a Hybrid Security Framework for Phishing Awareness Education and Defense

open access: yesFuture Internet
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks.
Peter K. K. Loh   +2 more
doaj   +1 more source

CERT Strategy to Deal with Phishing Attacks

open access: yesComputer Science & Information Technology (CS & IT), 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain phishing, and why an organization should deal with it and its challenges of providing.
openaire   +2 more sources

Implementation of the Random Forest Algorithm for Anomaly Detection of Phishing Attacks on Computer Networks

open access: yesJournal of Applied Informatics and Computing
Phishing attacks are among the most common and dangerous cyber security threats, as they exploit manipulation techniques to steal sensitive user information.
Andika Agus Slameto, Ben Rafi Kahmas
doaj   +1 more source

An Ontological Model of the Phishing Attack Process

open access: yes
Phishing attacks are common social engineering cyber attacks in which threat actors masquerade as reputable entities to mislead recipients into performing specific actions, such as revealing financial information, system login credentials, or installing malware. Grasping the phishing attack process is crucial to prevent and counteract this type of scam.
Italo Jose da Silva Oliveira   +8 more
openaire   +1 more source

Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]

open access: yes
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core  

Outflanking and securely using the PIN/TAN-System

open access: yes, 2005
The PIN/TAN-system is an authentication and authorization scheme used in e-business. Like other similar schemes it is successfully attacked by criminals.
Buchmann, J.   +3 more
core  

Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model

open access: yesHumanities & Social Sciences Communications
Mobile phishing has emerged as one of the most severe cybercrime threats; thus, research must examine the factors affecting people’s likelihood of becoming instant messaging phishing targets.
Chin Lay Gan, Yi Yong Lee, Tze Wei Liew
doaj   +1 more source

Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis

open access: yesIEEE Access
Phishing attacks are a growing threat that has evolved along with technological advancements. Existing detection methods struggle with constantly evolving tactics and “zero-day” attacks that exploit unknown vulnerabilities.
Gabriela Brezeanu   +2 more
doaj   +1 more source

Deep Learning Approaches for Multi-Class Classification of Phishing Text Messages

open access: yesJournal of Cybersecurity and Privacy
Phishing attacks, particularly Smishing (SMS phishing), have become a major cybersecurity threat, with attackers using social engineering tactics to take advantage of human vulnerabilities.
Miriam L. Munoz, Muhammad F. Islam
doaj   +1 more source

Home - About - Disclaimer - Privacy