Results 71 to 80 of about 1,061,727 (224)
Recently, phishing attacks have been increasing tremendously, and attackers discover new techniques every day to deceive users. With the advancement of technology, teenagers are considered the most technologically advanced generation, having grown up ...
Rosemary Cosmas Tlatlaa Panga +2 more
doaj +1 more source
Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems [PDF]
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only.
Barraclough, Phoebe, Fehringer, Gerhard
core +1 more source
A Literature Survey on Potential Private User Information Leakage in Metaverse Applications
This survey explores potential privacy risks in the Metaverse, focusing on personal data inferred from virtual reality headsets embedded with passive brain‐computer interfaces (BCI). It reviews how age, gender, and ethnicity can be predicted using neurophysiological signals, (e.g., electroencephalogram). The survey also explores future threats from non‐
Mina Jaberi, Tiago H. Falk
wiley +1 more source
Detecting and characterizing lateral phishing at scale [PDF]
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A +7 more
core +2 more sources
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques.
Dania Aljeaid +3 more
doaj +1 more source
Phishing, a well-known cyber-attack practice has gained significant research attention in the cyber-security domain for the last two decades due to its dynamic attacking strategies.
Subhash Ariyadasa +2 more
doaj +1 more source
Assessing the impact of affective feedback on end-user security awareness [PDF]
A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users ...
Archibald, Jacqueline +2 more
core +2 more sources
Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem +4 more
wiley +1 more source
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri +7 more
doaj +1 more source

