Results 51 to 60 of about 1,061,727 (224)

Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning

open access: yesFrontiers Comput. Sci.
The dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge.
M. A. Tamal   +4 more
semanticscholar   +1 more source

Phishing Attacks in the Age of Generative Artificial Intelligence: A Systematic Review of Human Factors

open access: yesAI
Despite the focus on improving cybersecurity awareness, the number of cyberattacks has increased significantly, leading to huge financial losses, with their risks spreading throughout the world. This is due to the techniques deployed in cyberattacks that
Raja Jabir, John Le, Chau Nguyen
doaj   +1 more source

Phishing Detection System Through Hybrid Machine Learning Based on URL

open access: yesIEEE Access, 2023
Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has become the most severe and dangerous cybercrime on the internet.
Abdul Karim   +4 more
doaj   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

Baiting the hook: factors impacting susceptibility to phishing attacks [PDF]

open access: yes, 2016
Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise.
Erola, Arnau   +2 more
core   +2 more sources

The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia

open access: yesSoshum: Jurnal Sosial dan Humaniora
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani   +2 more
doaj   +1 more source

Classification of Phishing Email Using Random Forest Machine Learning Technique

open access: yesJournal of Applied Mathematics, 2014
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu   +1 more
doaj   +1 more source

Assessing the role of conceptual knowledge in an anti-phishing game [PDF]

open access: yes, 2014
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to support learning and confidence development in several domains, including the secure use of computers.
Arachchilage, NAG, Ghinea, G, Scott, MJ
core   +1 more source

Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs) [PDF]

open access: yes, 2020
The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites.
Halgas, L, Agrafiotis, I, Nurse, J
openaire   +2 more sources

A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)

open access: yesInternational Journal of Information Security
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural networks (CNNs), have emerged as promising tools for detecting ...
Mustafa Ahmed Elberri   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy