Results 191 to 200 of about 4,265,497 (230)
Some of the next articles are maybe not open access.

In-Depth Analysis of Phishing Email Detection: Evaluating the Performance of Machine Learning and Deep Learning Models Across Multiple Datasets

Applied Sciences
Phishing emails remain a primary vector for cyberattacks, necessitating advanced detection mechanisms. Existing studies often focus on limited datasets or a small number of models, lacking a comprehensive evaluation approach.
Abeer Alhuzali   +3 more
semanticscholar   +1 more source

Cue Utilization, Phishing Feature and Phishing Email Detection

2020
Cognitive processes are broadly considered to be of vital importance to understanding phishing email feature detection or misidentification. This research extends the current literature by introducing the concept of cue utilization as a unique predictor of phishing feature detection.
Piers Bayl-Smith   +2 more
openaire   +1 more source

Analysis on Phishing Detection Methods

ITM Web of Conferences
With the popularization of the Internet, phishing has become one of the most threatening attacks in the field of network security, and the number of attacks continues to climb, the means are becoming increasingly complex, and it seriously threatens the ...
Shisheng Zheng
semanticscholar   +1 more source

Detection of Phishing Websites

2023
Phishing attacks are one of the biggest security threats to personal and financial information on the internet. They are a type of cyber-attack where attackers pretend to be a trusted entity in order to trick people into revealing sensitive information, such as passwords and credit card numbers.
Lakshmipathi Gejjala   +3 more
openaire   +1 more source

PEAE-GNN: Phishing Detection on Ethereum via Augmentation Ego-Graph Based on Graph Neural Network

IEEE Transactions on Computational Social Systems
Recent years, the successful application of block-chain in cryptocurrency has attracted a lot of attention, but it has also led to a rapid growth of illegal and criminal activities.
Hexiang Huang   +6 more
semanticscholar   +1 more source

Machine learning based phishing detection from URLs

Expert systems with applications, 2019
Due to the rapid growth of the Internet, users change their preference from traditional shopping to the electronic commerce. Instead of bank/shop robbery, nowadays, criminals try to find their victims in the cyberspace with some specific tricks. By using
O. K. Sahingoz   +3 more
semanticscholar   +1 more source

Detection technology of phishing

2011 International Conference on Electrical and Control Engineering, 2011
Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account ...
Huajun Huang, Yaojun Wang, Lingxi Liu
openaire   +1 more source

Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection

Computing and Communication Workshop and Conference
Phishing attacks continue to be a pervasive challenge in cybersecurity, with threat actors constantly developing new strategies to penetrate email inboxes and compromise sensitive data.
Robin Chataut, P. Gyawali, Yusuf Usman
semanticscholar   +1 more source

Prompted Contextual Vectors for Spear-Phishing Detection

arXiv.org
Spear-phishing attacks present a significant security challenge, with large language models (LLMs) escalating the threat by generating convincing emails and facilitating target reconnaissance.
Daniel Nahmias   +3 more
semanticscholar   +1 more source

Detection of phishing attacks

2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire   +1 more source

Home - About - Disclaimer - Privacy