Results 201 to 210 of about 4,265,497 (230)
Some of the next articles are maybe not open access.

Walkthrough phishing detection techniques

Computers and Electrical Engineering
Tejveer Singh   +2 more
openaire   +2 more sources

Phishing Detection Methods

This chapter explores the evolution of phishing detection methods, present traditional, advanced, and hybrid approaches. Traditional methods provide a base layer of defense, but their effectiveness is limited against adaptive attacks. Advanced techniques employ machine learning (ML) and deep learning (DL) to enhance detection accuracy and leveraging ...
Sally D. Abualgasim, Zeinab E. Ahmed
openaire   +1 more source

Enhancing Phishing Detection through Feature Importance Analysis and Explainable AI: A Comparative Study of CatBoost, XGBoost, and EBM Models

arXiv.org
Phishing attacks remain a persistent threat to online security, demanding robust detection methods. This study investigates the use of machine learning to identify phishing URLs, emphasizing the crucial role of feature selection and model ...
Abdullah Fajar, S. Yazid, Indra Budi
semanticscholar   +1 more source

Proactive Phishing Sites Detection

IEEE/WIC/ACM International Conference on Web Intelligence, 2019
Phishing is one of the social engineering techniques to steal users’ sensitive information by disguising a fake Web site as a trustworthy one. Previous research proposed phishing mitigation techniques, such as blacklist, heuristics, visual similarity, and machine learning.
Akihito Nakamura, Fuma Dobashi
openaire   +1 more source

Phishing Web page detection

Eighth International Conference on Document Analysis and Recognition (ICDAR'05), 2005
An approach to detection of phishing Web pages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution to antiphishing. A legitimate Web page owner can use this approach to search the Web for suspicious Web pages which are visually similar to the true Web page.
null Liu Wenyin   +4 more
openaire   +1 more source

AI Enhanced Phishing Detection System

International Workshop on Intelligent Networking and Collaborative Systems
It attempts to create a sophisticated system that uses artificial intelligence (AI) methods to prevent and detect phishing assaults in advance. Cybersecurity is seriously threatened by phishing attempts, which take advantage of human weakness to trick ...
P. Chinnasamy   +5 more
semanticscholar   +1 more source

Phishing Detection Using MLT

International Journal on Science and Technology
—The Internet has become an indispensable part of our life, However, It also has provided opportunities to anony- mously perform malicious activities like Phishing. Phishers try to deceive their victims by social engineering or creating mock- up websites to steal information such as account ID, username, password from individuals and organizations.
JAYASURYA S R -   +2 more
openaire   +1 more source

Building an Intelligent Phishing Email Detection System Using Machine Learning and Feature Engineering

European Journal of Applied Science, Engineering and Technology
The prevalence of cybercrime is directly proportional to the growth in the number of people using the internet. There has been evidence of phishing's extensive usage since its beginning, and it is now the most successful cyberattack vector.
Purna Chandra Rao Chinta   +5 more
semanticscholar   +1 more source

An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach

Computer Networks
Phishing email is a serious cyber threat that tries to deceive users by sending false emails with the intention of stealing confidential information or causing financial harm.
Mohammad Amaz Uddin, Iqbal H. Sarker
semanticscholar   +1 more source

ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection

Security and Privacy in Communication Networks
The proliferation of phishing sites and emails poses significant challenges to existing cybersecurity efforts. Despite advances in malicious email filters and email security protocols, problems with oversight and false positives persist.
Takashi Koide   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy