Results 81 to 90 of about 28,445 (242)
Detecting Phishing Emails Using GloVe Word Embeddings and Ensemble Machine Learning Model
Phishing emails represent a critical cybersecurity challenge, exploiting human vulnerability to illicitly obtain sensitive personal and financial data. This study proposes a novel content‐based filtering framework for phishing email detection, employing Global Vectors for Word Representation (GloVe) embeddings for semantic feature extraction and a ...
Sulaiman A. Maeli +2 more
wiley +1 more source
A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni +4 more
core
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley +1 more source
Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees
Organizational security assurance is a complex and multi-dimensional task. One of the biggest threats to an organization is the credulity of phishing attacks for its employees.
Justinas Rastenis +4 more
doaj +1 more source
To deceive or not to deceive! Legal implications of phishing covert research
Whilst studying mobile users' susceptibility to phishing attacks, we found ourselves subject to regulations concerning the use of deception in research. We argue that such regulations are misapplied in a way that hinders the progress of security research.
Sugiura, Lisa
core +1 more source
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai +4 more
doaj +1 more source
The rapid advancement of technology has made cybersecurity a crucial industry. One such prominent menace is phishing, which refers to any fraudulent act aimed at collecting personal data like passwords and credit card information under the guise of genuine organizations.Phishing attacks are often performed through electronic email, social media ...
openaire +1 more source
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati +2 more
doaj +1 more source

