Results 21 to 30 of about 4,265,497 (230)

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis [PDF]

open access: yes, 2020
Recently, the development and implementation of phishing attacks require little technical skills and costs. This uprising has led to an ever-growing number of phishing attacks on the World Wide Web.
Chen, Yingke, Opara, Chidimma, Wei, Bo
core   +2 more sources

Enhancing Case-based Reasoning Approach using Incremental Learning Model for Automatic Adaptation of Classifiers in Mobile Phishing Detection

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2020
This article presents the threshold-based incremental learning model for a case-base updating approach that can support adaptive detection and incremental learning of Case-based Reasoning (CBR)-based automatic adaptable phishing detection.
San Kyaw Zaw, Sangsuree Vasupongayya
doaj   +1 more source

SPWalk: Similar Property Oriented Feature Learning for Phishing Detection

open access: yesIEEE Access, 2020
Detecting phishing webpages is an essential task that protects legitimate websites and their users from various malicious activities. To classify the suspect webpage as phishing or legitimate, robust and effective features used for classification are in ...
Xiuwen Liu, Jianming Fu
doaj   +1 more source

Scalable Detection and Isolation of Phishing [PDF]

open access: yes, 2009
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core   +2 more sources

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation

open access: yesCryptography, 2022
This paper introduces a novel detection method for phishing website attacks while avoiding the issues associated with the deficiencies of the knowledge-based representation and the binary decision. The suggested detection method was performed using Fuzzy
Mohammad Almseidin   +3 more
doaj   +1 more source

Detecting phishing webpages via homology analysis of webpage structure [PDF]

open access: yesPeerJ Computer Science, 2022
Phishing webpages are often generated by phishing kits or evolved from existing kits. Therefore, the homology analysis of phishing webpages can help curb the proliferation of phishing webpages from the source.
Jian Feng   +3 more
doaj   +2 more sources

Phishing Detection Browser

open access: yes, 2023
Phishing is a severe threat to online users, especially since attackers improve in impersonating other websites. Phishing is an act of cracking by single person or group of persons to steal the personal confidential information such as credit card details, bank account details, passwords etc., from unknown suffered for illegal activities. With websites
Agrawal, Sachin, Fandi, Nikita
openaire   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Research of phishing detection technology

open access: yes网络与信息安全学报, 2017
The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included ...
Xi ZHANG   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy