Results 81 to 90 of about 28,445 (242)

Detecting Phishing Emails Using GloVe Word Embeddings and Ensemble Machine Learning Model

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Phishing emails represent a critical cybersecurity challenge, exploiting human vulnerability to illicitly obtain sensitive personal and financial data. This study proposes a novel content‐based filtering framework for phishing email detection, employing Global Vectors for Word Representation (GloVe) embeddings for semantic feature extraction and a ...
Sulaiman A. Maeli   +2 more
wiley   +1 more source

A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]

open access: yes
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni   +4 more
core  

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

FedAnomDetect a Clustered Federated Learning Framework for Robust Anomaly Detection With Enhanced Privacy and Communication Efficiency

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley   +1 more source

Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees

open access: yesApplied Sciences
Organizational security assurance is a complex and multi-dimensional task. One of the biggest threats to an organization is the credulity of phishing attacks for its employees.
Justinas Rastenis   +4 more
doaj   +1 more source

To deceive or not to deceive! Legal implications of phishing covert research

open access: yes, 2013
Whilst studying mobile users' susceptibility to phishing attacks, we found ourselves subject to regulations concerning the use of deception in research. We argue that such regulations are misapplied in a way that hinders the progress of security research.
Sugiura, Lisa
core   +1 more source

Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers

open access: yesIEEE Access
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai   +4 more
doaj   +1 more source

Phishing Attacks Execution

open access: yesJournal of Information Systems Engineering and Management
The rapid advancement of technology has made cybersecurity a crucial industry. One such prominent menace is phishing, which refers to any fraudulent act aimed at collecting personal data like passwords and credit card information under the guise of genuine organizations.Phishing attacks are often performed through electronic email, social media ...
openaire   +1 more source

Indonesian SMEs and Cybersecurity: Developing Instrument to Test SMEs Owners’ Capability in Detecting Phishing Emails

open access: yesRiset Akuntansi dan Keuangan Indonesia
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy