Results 111 to 120 of about 4,265,497 (230)
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang +4 more
doaj +1 more source
Damage caused due to phishing attacks is that which targets the user's personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people ...
Neeraja Koppula +2 more
openaire +1 more source
OFF-The-Hook: A Tool to Detect Zero-Font and Traditional Phishing Attacks in Real Time
Phishing attacks continue to pose serious challenges to cybersecurity, with attackers constantly refining their methods to bypass detection systems. One particularly evasive technique is Zero-Font phishing, which involves the insertion of invisible or ...
Nazar Abbas Saqib +9 more
doaj +1 more source
Investigation of Attitudes Towards Security Behaviors [PDF]
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core +1 more source
Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking
Phishing is one of the most harmful social engineering techniques to subdue end users where threat actors find a chance to gain access to critical information systems.
Tommy Chin, Kaiqi Xiong, Chengbin Hu
doaj +1 more source
Your employees: the front line in cyber security [PDF]
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core
With the rapid expansion of the internet and the growing sophistication of cyber threats, phishing attacks have become a serious cybersecurity challenge for individuals and organizations.
Yanche Ari Kustiawan +1 more
doaj +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
A case study on phishing detection with a machine learning net
Phishing attacks aims to steal sensitive information and, unfortunately, are becoming a common practice on the web. Email phishing is one of the most common types of attacks on the web and can have a big impact on individuals and enterprises.
Ana Bezerra +6 more
semanticscholar +1 more source
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core

