Results 91 to 100 of about 4,265,497 (230)
Secure Authentication via Quantum Physical Unclonable Functions: A Review
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré +8 more
wiley +1 more source
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati +2 more
doaj +1 more source
Phishing continues to be one of the most prevalent and damaging forms of cybercrime, exploiting social engineering techniques to deceive users into divulging sensitive information such as login credentials, banking details, and personal data. Traditional defenses such as spam filters, antivirus software, and employee awareness campaigns have proven ...
null Hemant Shankar Junghare +3 more
openaire +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Real-time phishing detection using deep learning methods by extensions
Phishing is an attack method that relies on a user’s insufficient vigilance and understanding of the internet. For example, an attacker creates an online transaction website and tricks users into logging into the fake website to steal their personal ...
Dam Minh Linh +4 more
semanticscholar +1 more source
Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Enhancing Phishing Detection in Semantic Web Systems Using Optimized Deep Learning Models
Phishing detection in Semantic Web systems is crucial to safeguarding users from malicious attacks. In this context, this work presents a deep learning-based phishing attack detection model using MobileBERT for feature extraction and hyperparameter ...
Liang Zhou +5 more
semanticscholar +1 more source
PDMLP: Phishing Detection using Multilayer Perceptron
A phishing website is a significant problem on the internet. It’s one of the Cyber-attack types where attackers try to obtain sensitive information such as username and password or credit card information. The recent growth in deploying a Detection phishing URL system on many websites has resulted in a massive amount of available data to predict ...
Al-Ahmadi, Saad, Lasloum, Tariq
openaire +1 more source
Cyber-crime Science = Crime Science + Information Security [PDF]
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter +2 more
core +2 more sources
We present a metaheuristic feature‐selection framework—Artificial Bee Colony, Aquila Optimiser and Fox Optimiser—for blockchain fraud detection, benchmarked across machine‐learning and deep‐learning models on large‐scale transaction data. The study evaluates predictive performance (PR‐AUC/ROC‐AUC), stability across seeds and parsimony under cost ...
Hibatou allah Boulsane, Karim Afdel
wiley +1 more source

