Results 201 to 210 of about 28,722 (249)
Meta-learner-based frameworks for interpretable email spam detection. [PDF]
Kshirsagar M, Rathi V, Ryan C.
europepmc +1 more source
Towards Improved Phishing Website Detection: Heuristic-Based Approaches vs. Machine Learning
Dmytro Shutenko +3 more
openalex +1 more source
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Phishing Detection: A Literature Survey
IEEE Communications Surveys and Tutorials, 2013This article surveys the literature on the detection of phishing attacks. Phishing attacks target vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread via mechanisms that exploit weaknesses found in end-users, which makes users the weakest element in the security chain. The phishing problem is broad and no single
Youssef Iraqi, Andy Jones
exaly +2 more sources
YMER Digital, 2022
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Gokul R, Felix M Philip
openaire +1 more source
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Gokul R, Felix M Philip
openaire +1 more source
Eighth International Conference on Document Analysis and Recognition (ICDAR'05), 2005
An approach to detection of phishing Web pages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution to antiphishing. A legitimate Web page owner can use this approach to search the Web for suspicious Web pages which are visually similar to the true Web page.
Wenyin Liu +4 more
openaire +1 more source
An approach to detection of phishing Web pages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution to antiphishing. A legitimate Web page owner can use this approach to search the Web for suspicious Web pages which are visually similar to the true Web page.
Wenyin Liu +4 more
openaire +1 more source
Phish Detect-Real Time Phish Detecting Browser Extension
Journal of Computational and Theoretical Nanoscience, 2020Now a days, hacking has become a trend, where the personal information or user data including login credentials, credit card numbers, such as transaction from our bank accounts, key information from government office, defense etc., which threatens the privacy and property security of netizens in wireless communication. This is being done by creating a
Shiva Nandhini +4 more
openaire +1 more source

