Results 191 to 200 of about 1,061,727 (224)
Some of the next articles are maybe not open access.

Phishing Attacks and Protection Against Them

IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, 2021
Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such attacks, specifically, attacks using ransomware, malicious PDF files, and banking trojans.
M. A. Ivanov   +3 more
semanticscholar   +1 more source

Combating the Phishing Attacks

2022
The phishing attack targets the client's email and any other connection medium to illicitly get the user credentials of e-commerce websites, educational websites, banks, credit card information, and other crucial user information. Exploitations caused by different types of cyberattacks result in data loss, identity theft, financial loss, and various ...
Sonia Tasmin   +3 more
openaire   +1 more source

Detection of phishing attacks

2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire   +1 more source

Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks

Applied Sciences
Phishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites.
Qazi Emad ul Haq   +2 more
semanticscholar   +1 more source

Phishing Attacks Detection using Machine Learning Approach

2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020
Evolving digital transformation has exacerbated cybersecurity threats globally. Digitization expands the doors wider to cybercriminals. Initially cyberthreats approach in the form of phishing to steal the confidential user credentials.
Mohammad Nazmul Alam   +5 more
semanticscholar   +1 more source

Identifying phishing attacks in communication networks using URL consistency features

International Journal of Electronic Security and Digital Forensics, 2020
Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent.
Robertas Damaševičius   +4 more
semanticscholar   +1 more source

From ML to LLM: Evaluating the Robustness of Phishing Web Page Detection Models against Adversarial Attacks

Digital Threats: Research and Practice
Phishing attacks attempt to deceive users into stealing sensitive information, posing a significant cybersecurity threat. Advances in Machine Learning (ML) and Deep Learning (DL) have led to the development of numerous phishing web page detection ...
Aditya Kulkarni   +3 more
semanticscholar   +1 more source

Phishing Attacks Detection using Deep Learning Approach

2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020
In the COVID-19 pandemic, people are enforced to adopt ‘work from home’ policy. The Internet has become an effective channel for social interactions nowadays. Peoples' immense dependence on digital platform opens doors for fraud.
Ishita Saha   +5 more
semanticscholar   +1 more source

Mitigating Email Phishing Attacks using Convolutional Neural Networks

International Conference on Control, Automation and Information Sciences, 2020
Phishing detection has gained huge attention from both academia and industry. Damages and data breaches affecting private and governmental entities caused by email phishing attacks needed an immediate solution.
Reem M. Alotaibi   +2 more
semanticscholar   +1 more source

Hunter Hunted - Mitigating Phishing Attacks

Journal of Computer Science and Its Application, 2012
The webscape is swarmed with increasing numbers of emails and websites that attempts to deceive users into providing identity information by purporting to emanate from trusted entities. These e-mails referred to as “phishing e-mails” masquerade trusted party emblems, logos and trademarks and contains phony weblinks that compromise users ...
Longe, OB, Wada, F
openaire   +2 more sources

Home - About - Disclaimer - Privacy