Results 21 to 30 of about 28,722 (249)

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

SPWalk: Similar Property Oriented Feature Learning for Phishing Detection

open access: yesIEEE Access, 2020
Detecting phishing webpages is an essential task that protects legitimate websites and their users from various malicious activities. To classify the suspect webpage as phishing or legitimate, robust and effective features used for classification are in ...
Xiuwen Liu, Jianming Fu
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Research of phishing detection technology

open access: yes网络与信息安全学报, 2017
The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included ...
Xi ZHANG   +3 more
doaj   +3 more sources

Detecting Phishing Sites -- An Overview

open access: yesCoRR, 2021
Phishing is one of the most severe cyber-attacks where researchers are interested to find a solution. In phishing, attackers lure end-users and steal their personal in-formation. To minimize the damage caused by phishing must be detected as early as possible.
P. Kalaharsha, Babu M. Mehtre
openaire   +2 more sources

Detecting phishing webpages via homology analysis of webpage structure [PDF]

open access: yesPeerJ Computer Science, 2022
Phishing webpages are often generated by phishing kits or evolved from existing kits. Therefore, the homology analysis of phishing webpages can help curb the proliferation of phishing webpages from the source.
Jian Feng   +3 more
doaj   +2 more sources

Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation

open access: yesCryptography, 2022
This paper introduces a novel detection method for phishing website attacks while avoiding the issues associated with the deficiencies of the knowledge-based representation and the binary decision. The suggested detection method was performed using Fuzzy
Mohammad Almseidin   +3 more
doaj   +1 more source

A Method for Domain Detection and Web Page Analysis Targeting Web3 Phishing Websites [PDF]

open access: yesJisuanji gongcheng
As the paradigm of ″decentralized next-generation Internet,″ Web3, relying on blockchain technology, has become an emerging field with great potential in the digital intelligence service ecosystem. However, Web3 phishing websites pose a serious threat to
LIU Ronglong, LI Ziwei, WAN Yue, WU Jiajing, JIANG Zigui
doaj   +1 more source

A predictive model for phishing detection

open access: yesJournal of King Saud University - Computer and Information Sciences, 2022
Nowadays, many anti-phishing systems are being developed to identify phishing contents in online communication systems. Despite the availability of myriads anti-phishing systems, phishing continues unabated due to inadequate detection of a zero-day attack, superfluous computational overhead and high false rates.
A.A. Orunsolu   +2 more
openaire   +2 more sources

An Ideal Approach for Detection and Prevention of Phishing Attacks [PDF]

open access: yes, 2001
Phishing is a treacherous attempt to embezzle personal information such as bank account details, credit card information, social security number, employment details, and online shopping account passwords and so on from internet users.
Shekokar, Narendra. M.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy