Results 191 to 200 of about 4,265,497 (230)
Some of the next articles are maybe not open access.
Applied Sciences
Phishing emails remain a primary vector for cyberattacks, necessitating advanced detection mechanisms. Existing studies often focus on limited datasets or a small number of models, lacking a comprehensive evaluation approach.
Abeer Alhuzali +3 more
semanticscholar +1 more source
Phishing emails remain a primary vector for cyberattacks, necessitating advanced detection mechanisms. Existing studies often focus on limited datasets or a small number of models, lacking a comprehensive evaluation approach.
Abeer Alhuzali +3 more
semanticscholar +1 more source
Cue Utilization, Phishing Feature and Phishing Email Detection
2020Cognitive processes are broadly considered to be of vital importance to understanding phishing email feature detection or misidentification. This research extends the current literature by introducing the concept of cue utilization as a unique predictor of phishing feature detection.
Piers Bayl-Smith +2 more
openaire +1 more source
Analysis on Phishing Detection Methods
ITM Web of ConferencesWith the popularization of the Internet, phishing has become one of the most threatening attacks in the field of network security, and the number of attacks continues to climb, the means are becoming increasingly complex, and it seriously threatens the ...
Shisheng Zheng
semanticscholar +1 more source
Detection of Phishing Websites
2023Phishing attacks are one of the biggest security threats to personal and financial information on the internet. They are a type of cyber-attack where attackers pretend to be a trusted entity in order to trick people into revealing sensitive information, such as passwords and credit card numbers.
Lakshmipathi Gejjala +3 more
openaire +1 more source
PEAE-GNN: Phishing Detection on Ethereum via Augmentation Ego-Graph Based on Graph Neural Network
IEEE Transactions on Computational Social SystemsRecent years, the successful application of block-chain in cryptocurrency has attracted a lot of attention, but it has also led to a rapid growth of illegal and criminal activities.
Hexiang Huang +6 more
semanticscholar +1 more source
Machine learning based phishing detection from URLs
Expert systems with applications, 2019Due to the rapid growth of the Internet, users change their preference from traditional shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try to find their victims in the cyberspace with some specific tricks. By using
O. K. Sahingoz +3 more
semanticscholar +1 more source
Detection technology of phishing
2011 International Conference on Electrical and Control Engineering, 2011Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account ...
Huajun Huang, Yaojun Wang, Lingxi Liu
openaire +1 more source
Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection
Computing and Communication Workshop and ConferencePhishing attacks continue to be a pervasive challenge in cybersecurity, with threat actors constantly developing new strategies to penetrate email inboxes and compromise sensitive data.
Robin Chataut, P. Gyawali, Yusuf Usman
semanticscholar +1 more source
Prompted Contextual Vectors for Spear-Phishing Detection
arXiv.orgSpear-phishing attacks present a significant security challenge, with large language models (LLMs) escalating the threat by generating convincing emails and facilitating target reconnaissance.
Daniel Nahmias +3 more
semanticscholar +1 more source
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source

