Results 101 to 110 of about 4,265,497 (230)

A Comparative Analysis of Machine Learning Techniques for URL Phishing Detection

open access: yesEngineering, Technology & Applied Science Research
The growing threat of URL phishing attacks raises the need for advanced detection systems to protect digital environments. This paper explores the effectiveness of various machine learning models in classifying URLs as phishing or benign, focusing on the
Adel Albishri, M. Dessouky
semanticscholar   +1 more source

FedPhishLLM: A privacy-preserving and explainable phishing detection mechanism using federated learning and LLMs

open access: yesJournal of King Saud University: Computer and Information Sciences
Phishing attacks remain a significant cybersecurity threat, exploiting social engineering techniques to deceive users and steal sensitive information.
Wenhao Li   +2 more
doaj   +1 more source

Robustness Analysis of Distributed CNN Model Training in Expression Recognition

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley   +1 more source

Characterizing Phishing Threats with Natural Language Processing

open access: yes, 2015
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core   +1 more source

Optimized AI-Driven Semantic Web Approach for Enhancing Phishing Detection in E-Commerce Platforms

open access: yesInternational Journal on Semantic Web and Information Systems (IJSWIS)
For e-commerce systems, phishing attempts remain a major threat, so sophisticated detection techniques using Semantic Web and artificial intelligence are very necessary.
Akshat Gaurav   +6 more
semanticscholar   +1 more source

Phish-Master: Leveraging Large Language Models for Advanced Phishing Email Generation and Detection

open access: yesApplied Sciences
Phishing emails present a significant and persistent cybersecurity threat to individuals and organizations globally due to the difficulty in detecting these malicious messages. Large Language Models (LLMs) have inadvertently intensified this challenge by
Weihong Han   +5 more
doaj   +1 more source

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

Sentence Level Analysis Model for Phishing Detection Using KNN

open access: yesJournal of Cyber Security
Phishing emails have experienced a rapid surge in cyber threats globally, especially following the emergence of the COVID-19 pandemic. This form of attack has led to substantial financial losses for numerous organizations.
Lindah Sawe   +3 more
semanticscholar   +1 more source

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning

open access: yesFrontiers in Computer Science
IntroductionThe dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge.
Maruf A. Tamal   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy