Results 221 to 230 of about 28,722 (249)
Some of the next articles are maybe not open access.
Phishing Detection on Twitter Streams
2016With the prevalence of cutting-edge technology, the social media network is gaining popularity and is becoming a worldwide phenomenon. Twitter is one of the most widely used social media sites, with over 500 million users all around the world. Along with its rapidly growing number of users, it has also attracted unwanted users such as scammers ...
Se Yeong Jeong +2 more
openaire +1 more source
Detect phishing by checking content consistency
Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014), 2014Phishing is a form of cybercrime used to lure a victim to reveal his/her sensitive personal information to fraudulent web pages. To protect users from phishing attacks, many anti-phishing techniques have been proposed to block suspicious web pages, which are identified against registered black-lists, or checked by search engines.
Yi-Shin Chen +3 more
openaire +1 more source
An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection
2009 International Conference on Intelligent Networking and Collaborative Systems, 2009Phishing attacks have become a serious problem for users of online banking and e-commerce websites. A previous study proposed and evaluated a novel anti-Phishing approach that uses training intervention for Phishing websites detection (APTIPWD). The proposed approach showed that it helped users to make correct decisions in distinguishing Phishing and ...
Abdullah M. Alnajim, Malcolm Munro
openaire +1 more source
Helping the Phish Detect the Lure
2005When a client attempts to interact with an online service provider that performs any form of financial transaction, the service provider requires the client to authenticate itself. This is normally done by having the client provide a user-name and password that were previously agreed upon, through some procedure, the first time the client attempted to ...
openaire +1 more source
An Intelligent Anti-phishing Strategy Model for Phishing Website Detection
2012 32nd International Conference on Distributed Computing Systems Workshops, 2012As a new form of malicious software, phishing websites appear frequently in recent years, which cause great harm to online financial services and data security. In this paper, we design and implement an intelligent model for detecting phishing websites.
Weiwei Zhuang +2 more
openaire +1 more source
Phish Block: A Blockchain Framework for Phish Detection in Cloud
Computer Systems Science and Engineering, 2023R. N. Karthika +2 more
openaire +1 more source
Visual-similarity-based phishing detection
Proceedings of the 4th international conference on Security and privacy in communication netowrks, 2008Phishing is a form of online fraud that aims to steal a user's sensitive information, such as online banking passwords or credit card numbers. The victim is tricked into entering such information on a web page that is crafted by the attacker so that it mimics a legitimate page.
MEDVET, Eric +2 more
openaire +2 more sources
This chapter explores the evolution of phishing detection methods, present traditional, advanced, and hybrid approaches. Traditional methods provide a base layer of defense, but their effectiveness is limited against adaptive attacks. Advanced techniques employ machine learning (ML) and deep learning (DL) to enhance detection accuracy and leveraging ...
Sally D. Abualgasim, Zeinab E. Ahmed
openaire +1 more source
Sally D. Abualgasim, Zeinab E. Ahmed
openaire +1 more source

