Results 101 to 110 of about 4,265,497 (230)
A Comparative Analysis of Machine Learning Techniques for URL Phishing Detection
The growing threat of URL phishing attacks raises the need for advanced detection systems to protect digital environments. This paper explores the effectiveness of various machine learning models in classifying URLs as phishing or benign, focusing on the
Adel Albishri, M. Dessouky
semanticscholar +1 more source
Phishing attacks remain a significant cybersecurity threat, exploiting social engineering techniques to deceive users and steal sensitive information.
Wenhao Li +2 more
doaj +1 more source
Robustness Analysis of Distributed CNN Model Training in Expression Recognition
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley +1 more source
Characterizing Phishing Threats with Natural Language Processing
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core +1 more source
Optimized AI-Driven Semantic Web Approach for Enhancing Phishing Detection in E-Commerce Platforms
For e-commerce systems, phishing attempts remain a major threat, so sophisticated detection techniques using Semantic Web and artificial intelligence are very necessary.
Akshat Gaurav +6 more
semanticscholar +1 more source
Phish-Master: Leveraging Large Language Models for Advanced Phishing Email Generation and Detection
Phishing emails present a significant and persistent cybersecurity threat to individuals and organizations globally due to the difficulty in detecting these malicious messages. Large Language Models (LLMs) have inadvertently intensified this challenge by
Weihong Han +5 more
doaj +1 more source
Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa +6 more
wiley +1 more source
Sentence Level Analysis Model for Phishing Detection Using KNN
Phishing emails have experienced a rapid surge in cyber threats globally, especially following the emergence of the COVID-19 pandemic. This form of attack has led to substantial financial losses for numerous organizations.
Lindah Sawe +3 more
semanticscholar +1 more source
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
IntroductionThe dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge.
Maruf A. Tamal +4 more
doaj +1 more source

