Results 111 to 120 of about 4,265,497 (230)

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism

open access: yesIEEE Access, 2019
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang   +4 more
doaj   +1 more source

URL Based Phishing Detection

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
Damage caused due to phishing attacks is that which targets the user's personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people ...
Neeraja Koppula   +2 more
openaire   +1 more source

OFF-The-Hook: A Tool to Detect Zero-Font and Traditional Phishing Attacks in Real Time

open access: yesApplied System Innovation
Phishing attacks continue to pose serious challenges to cybersecurity, with attackers constantly refining their methods to bypass detection systems. One particularly evasive technique is Zero-Font phishing, which involves the insertion of invisible or ...
Nazar Abbas Saqib   +9 more
doaj   +1 more source

Investigation of Attitudes Towards Security Behaviors [PDF]

open access: yes, 2018
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core   +1 more source

Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking

open access: yesIEEE Access, 2018
Phishing is one of the most harmful social engineering techniques to subdue end users where threat actors find a chance to gain access to critical information systems.
Tommy Chin, Kaiqi Xiong, Chengbin Hu
doaj   +1 more source

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

PhishOFE: A Novel Machine Learning Framework for Real-Time Phishing URL Detection With Optimized Feature Engineering

open access: yesIEEE Access
With the rapid expansion of the internet and the growing sophistication of cyber threats, phishing attacks have become a serious cybersecurity challenge for individuals and organizations.
Yanche Ari Kustiawan   +1 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

A case study on phishing detection with a machine learning net

open access: yesInternational Journal of Data Science and Analysis
Phishing attacks aims to steal sensitive information and, unfortunately, are becoming a common practice on the web. Email phishing is one of the most common types of attacks on the web and can have a big impact on individuals and enterprises.
Ana Bezerra   +6 more
semanticscholar   +1 more source

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

Home - About - Disclaimer - Privacy