Results 11 to 20 of about 4,265,497 (230)

Enhancing Phishing Detection: A Machine Learning Approach With Feature Selection and Deep Learning Models

open access: yesIEEE Access
With the rise in cybercrime, phishing remains a significant concern as it targets individuals with fake websites, causing victims to disclose their private information.
Ganesh S. Nayak   +2 more
doaj   +2 more sources

Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions

open access: yesIEEE Access, 2022
Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the deficiency in performance accuracy and inability to detect unknown attacks despite
Nguyet Quang Do   +4 more
doaj   +2 more sources

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

open access: yesIEEE Open Journal of the Communications Society
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad   +6 more
doaj   +2 more sources

A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators. [PDF]

open access: yesSensors (Basel), 2023
Organizations and individuals worldwide are becoming increasingly vulnerable to cyberattacks as phishing continues to grow and the number of phishing websites grows. As a result, improved cyber defense necessitates more effective phishing detection (PD).
Aldakheel EA   +4 more
europepmc   +2 more sources

An intelligent cyber security phishing detection system using deep learning techniques. [PDF]

open access: yesCluster Comput, 2022
Recently, phishing attacks have become one of the most prominent social engineering attacks faced by public internet users, governments, and businesses. In response to this threat, this paper proposes to give a complete vision to what Machine learning is,
Mughaid A   +5 more
europepmc   +2 more sources

Applications of deep learning for phishing detection: a systematic literature review. [PDF]

open access: yesKnowl Inf Syst, 2022
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online social networks, and mobile applications.
Catal C   +6 more
europepmc   +2 more sources

Phishing Website Detection

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Abstract: Phishing is an online threat where an attacker impersonates an authentic and trustworthy organization to obtain sensitive information from a victim. One example of such is trolling, which has long been considered a problem. However, recent advances in phishing detection, such as machine learning-based methods, have assisted in combatting ...
Abhijith Gowda BN, Dawood   +1 more
  +5 more sources

A Survey of Machine Learning-Based Solutions for Phishing Website Detection

open access: yesMachine Learning and Knowledge Extraction, 2021
With the development of the Internet, network security has aroused people’s attention. It can be said that a secure network environment is a basis for the rapid and sound development of the Internet. Phishing is an essential class of cybercriminals which
Lizhen Tang, Qusay H. Mahmoud
doaj   +1 more source

PDGAN: Phishing Detection With Generative Adversarial Networks

open access: yesIEEE Access, 2022
Phishing is a harmful online attack that could lead to identity theft and financial damages. The demand for high-accuracy phishing detection tools has risen due to the increase of online electronic services and payment systems.
Saad Al-Ahmadi   +2 more
doaj   +1 more source

Phishing Website Detection

open access: yesInternational Journal of Scientific Research in Science and Technology, 2022
It is a crime to practice phishing by employing technical tricks and social engineering to exploit the innocence of unaware users. This methodology usually covers up a trustworthy entity so as to influence a consumer to execute an action if asked by the imitated entity.
null Mr. Tahir Naquash H B   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy