Results 191 to 200 of about 1,061,727 (224)
Some of the next articles are maybe not open access.
Phishing Attacks and Protection Against Them
IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, 2021Phishing, ransomware and cryptojacking are the main threats to cyber security in recent years. We consider the stages of phishing attacks, examples of such attacks, specifically, attacks using ransomware, malicious PDF files, and banking trojans.
M. A. Ivanov +3 more
semanticscholar +1 more source
Combating the Phishing Attacks
2022The phishing attack targets the client's email and any other connection medium to illicitly get the user credentials of e-commerce websites, educational websites, banks, credit card information, and other crucial user information. Exploitations caused by different types of cyberattacks result in data loss, identity theft, financial loss, and various ...
Sonia Tasmin +3 more
openaire +1 more source
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Detecting Phishing URLs Based on a Deep Learning Approach to Prevent Cyber-Attacks
Applied SciencesPhishing is one of the most widely observed types of internet cyber-attack, through which hundreds of clients using different internet services are targeted every day through different replicated websites.
Qazi Emad ul Haq +2 more
semanticscholar +1 more source
Phishing Attacks Detection using Machine Learning Approach
2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020Evolving digital transformation has exacerbated cybersecurity threats globally. Digitization expands the doors wider to cybercriminals. Initially cyberthreats approach in the form of phishing to steal the confidential user credentials.
Mohammad Nazmul Alam +5 more
semanticscholar +1 more source
Identifying phishing attacks in communication networks using URL consistency features
International Journal of Electronic Security and Digital Forensics, 2020Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent.
Robertas Damaševičius +4 more
semanticscholar +1 more source
Digital Threats: Research and Practice
Phishing attacks attempt to deceive users into stealing sensitive information, posing a significant cybersecurity threat. Advances in Machine Learning (ML) and Deep Learning (DL) have led to the development of numerous phishing web page detection ...
Aditya Kulkarni +3 more
semanticscholar +1 more source
Phishing attacks attempt to deceive users into stealing sensitive information, posing a significant cybersecurity threat. Advances in Machine Learning (ML) and Deep Learning (DL) have led to the development of numerous phishing web page detection ...
Aditya Kulkarni +3 more
semanticscholar +1 more source
Phishing Attacks Detection using Deep Learning Approach
2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020In the COVID-19 pandemic, people are enforced to adopt ‘work from home’ policy. The Internet has become an effective channel for social interactions nowadays. Peoples' immense dependence on digital platform opens doors for fraud.
Ishita Saha +5 more
semanticscholar +1 more source
Mitigating Email Phishing Attacks using Convolutional Neural Networks
International Conference on Control, Automation and Information Sciences, 2020Phishing detection has gained huge attention from both academia and industry. Damages and data breaches affecting private and governmental entities caused by email phishing attacks needed an immediate solution.
Reem M. Alotaibi +2 more
semanticscholar +1 more source
Hunter Hunted - Mitigating Phishing Attacks
Journal of Computer Science and Its Application, 2012The webscape is swarmed with increasing numbers of emails and websites that attempts to deceive users into providing identity information by purporting to emanate from trusted entities. These e-mails referred to as “phishing e-mails” masquerade trusted party emblems, logos and trademarks and contains phony weblinks that compromise users ...
Longe, OB, Wada, F
openaire +2 more sources

