Results 51 to 60 of about 1,061,727 (224)
The dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge.
M. A. Tamal +4 more
semanticscholar +1 more source
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that
Raja Jabir, John Le, Chau Nguyen
doaj +1 more source
Phishing Detection System Through Hybrid Machine Learning Based on URL
Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has become the most severe and dangerous cybercrime on the internet.
Abdul Karim +4 more
doaj +1 more source
Phishing Techniques in Mobile Devices
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core +1 more source
Baiting the hook: factors impacting susceptibility to phishing attacks [PDF]
Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise.
Erola, Arnau +2 more
core +2 more sources
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani +2 more
doaj +1 more source
Classification of Phishing Email Using Random Forest Machine Learning Technique
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu +1 more
doaj +1 more source
Assessing the role of conceptual knowledge in an anti-phishing game [PDF]
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to support learning and confidence development in several domains, including the secure use of computers.
Arachchilage, NAG, Ghinea, G, Scott, MJ
core +1 more source
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs) [PDF]
The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites.
Halgas, L, Agrafiotis, I, Nurse, J
openaire +2 more sources
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting ...
Mustafa Ahmed Elberri +3 more
semanticscholar +1 more source

