Results 131 to 140 of about 4,265,497 (230)

Risky business: managing electronic payments in the 21st Century [PDF]

open access: yes
On June 20 and 21, 2005, the Payment Cards Center of the Federal Reserve Bank of Philadelphia, in conjunction with the Electronic Funds Transfer Association (EFTA), hosted a day-and-a-half forum, “Risky Business: Managing Electronic Payments in the 21st ...
Marilyn Bochicchio, Stanley Sienkiewicz
core  

Phishing to improve detection

open access: yesProceedings of the 2023 European Symposium on Usable Security, 2023
Sarah Ying Zheng, Ingolf Becker
openaire   +1 more source

PHISHSIM: Phishing Website Detection

open access: yesInternational Research Journal on Advanced Engineering and Management (IRJAEM)
In this paper, we introduce a powerful new approach for detecting phishing websites that is entirely feature-free. Our method, called PhishSim, uses the Normalized Compression Distance (NCD), a technique that requires no specialized parameters. NCD works by measuring the similarity of two websites through compression, eliminating the time and effort ...
null Nivyashree R   +4 more
openaire   +1 more source

Catch Me If You See: Using Visual Cue and Explanatory Feedback to Enhance Human Phishing Detection

open access: yesIEEE Access
Phishing attacks are a major cybersecurity threat that exploit human weaknesses to steal sensitive information. Although detection systems have improved, phishing attacks remain widespread which highlights the need for human-centered defenses.
Arifa I. Champa   +3 more
doaj   +1 more source

Explainable Machine Learning for Phishing Site Detection: A High‐Efficiency Approach Using Boosting Models and SHAP

open access: yesThe Journal of Engineering
Nowadays, a wide range of electronic devices are being connected through the internet, and a wide range of cybercrimes are being coordinated. Phishing is one of the most serious online crimes.
Khandaker Mohammad Mohi Uddin   +4 more
doaj   +1 more source

Towards Adversarial Phishing Detection

open access: yes, 2020
Over the recent decades, numerous evaluations of automated methods for detecting phishing attacks have been reporting stellar detection performances based on empirical evidence. These performances often neglect the adaptive behavior of an adversary seeking to evade detection, yielding uncertainty about their adversarial robustness.
Panum, Thomas K.   +3 more
openaire   +1 more source

Phish-Hook: Phishing Site Detection using URL Features

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2020
openaire   +1 more source

Home - About - Disclaimer - Privacy