Results 91 to 100 of about 4,265,497 (230)

Secure Authentication via Quantum Physical Unclonable Functions: A Review

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré   +8 more
wiley   +1 more source

Indonesian SMEs and Cybersecurity: Developing Instrument to Test SMEs Owners’ Capability in Detecting Phishing Emails

open access: yesRiset Akuntansi dan Keuangan Indonesia
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati   +2 more
doaj   +1 more source

Phishing Domain Detection

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology
Phishing continues to be one of the most prevalent and damaging forms of cybercrime, exploiting social engineering techniques to deceive users into divulging sensitive information such as login credentials, banking details, and personal data. Traditional defenses such as spam filters, antivirus software, and employee awareness campaigns have proven ...
null Hemant Shankar Junghare   +3 more
openaire   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Real-time phishing detection using deep learning methods by extensions

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE)
Phishing is an attack method that relies on a user’s insufficient vigilance and understanding of the internet. For example, an attacker creates an online transaction website and tricks users into logging into the fake website to steal their personal ...
Dam Minh Linh   +4 more
semanticscholar   +1 more source

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

Enhancing Phishing Detection in Semantic Web Systems Using Optimized Deep Learning Models

open access: yesInternational Journal on Semantic Web and Information Systems (IJSWIS)
Phishing detection in Semantic Web systems is crucial to safeguarding users from malicious attacks. In this context, this work presents a deep learning-based phishing attack detection model using MobileBERT for feature extraction and hyperparameter ...
Liang Zhou   +5 more
semanticscholar   +1 more source

PDMLP: Phishing Detection using Multilayer Perceptron

open access: yesInternational Journal of Network Security & Its Applications, 2020
A phishing website is a significant problem on the internet. It’s one of the Cyber-attack types where attackers try to obtain sensitive information such as username and password or credit card information. The recent growth in deploying a Detection phishing URL system on many websites has resulted in a massive amount of available data to predict ...
Al-Ahmadi, Saad, Lasloum, Tariq
openaire   +1 more source

Cyber-crime Science = Crime Science + Information Security [PDF]

open access: yes, 2010
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter   +2 more
core   +2 more sources

Metaheuristic‐Driven Feature Selection for Blockchain Fraud Detection: A Comparative Study on Machine and Deep Learning Models

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
We present a metaheuristic feature‐selection framework—Artificial Bee Colony, Aquila Optimiser and Fox Optimiser—for blockchain fraud detection, benchmarked across machine‐learning and deep‐learning models on large‐scale transaction data. The study evaluates predictive performance (PR‐AUC/ROC‐AUC), stability across seeds and parsimony under cost ...
Hibatou allah Boulsane, Karim Afdel
wiley   +1 more source

Home - About - Disclaimer - Privacy