The rapid advancement of technology has made cybersecurity a crucial industry. One such prominent menace is phishing, which refers to any fraudulent act aimed at collecting personal data like passwords and credit card information under the guise of genuine organizations.Phishing attacks are often performed through electronic email, social media ...
openaire +1 more source
Application of Machine Learning for Real-Time Phishing Attack Detection
Over the years, the Internet has been exploited to carry out a range of cyber attacks, with phishing being the most prominent one. Increasingly sophisticated techniques of phishing have threatened the security of many Internet-based systems.
Akshay Shankar Agrawal +4 more
doaj +1 more source
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks. [PDF]
Rajivan P, Gonzalez C.
europepmc +1 more source
Real time identification of phishing attacks through machine learning enhanced browser extensions. [PDF]
Dandotiya M +3 more
europepmc +1 more source
Explainable few-shot learning with modern BERT for detecting emerging phishing attacks using XF PhishBERT. [PDF]
Tawfik M +4 more
europepmc +1 more source
Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.
Gordon WJ +12 more
europepmc +1 more source
Understanding phishing discussions on stack overflow and information security stack exchange. [PDF]
Althobaiti K, Tahaei M.
europepmc +1 more source
A generative AI-driven cybersecurity framework for small and medium enterprises software development: an ANN-ISM approach. [PDF]
Awan M +5 more
europepmc +1 more source
MeAJOR: Merged email assets from joint open-source repositories. [PDF]
Cardoso F +4 more
europepmc +1 more source

