Results 31 to 40 of about 4,265,497 (230)

Datasets for phishing websites detection

open access: yesData in Brief, 2020
Phishing stands for a fraudulent process, where an attacker tries to obtain sensitive information from the victim. Usually, these kinds of attacks are done via emails, text messages, or websites. Phishing websites, which are nowadays in a considerable rise, have the same look as legitimate sites.
Grega Vrbančič   +2 more
openaire   +3 more sources

An Ideal Approach for Detection and Prevention of Phishing Attacks [PDF]

open access: yes, 2001
Phishing is a treacherous attempt to embezzle personal information such as bank account details, credit card information, social security number, employment details, and online shopping account passwords and so on from internet users.
Shekokar, Narendra. M.   +3 more
core   +1 more source

Phishing Detection System Through Hybrid Machine Learning Based on URL

open access: yesIEEE Access, 2023
Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has become the most severe and dangerous cybercrime on the internet.
Abdul Karim   +5 more
semanticscholar   +1 more source

A Deep Learning-Based Phishing Detection System Using CNN, LSTM, and LSTM-CNN

open access: yesElectronics, 2023
In terms of the Internet and communication, security is the fundamental challenging aspect. There are numerous ways to harm the security of internet users; the most common is phishing, which is a type of attack that aims to steal or misuse a user’s ...
Zainab Alshingiti   +5 more
semanticscholar   +1 more source

PhiDMA – A phishing detection model with multi-filter approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site.
Gunikhan Sonowal, K.S. Kuppusamy
doaj   +1 more source

A Method for Domain Detection and Web Page Analysis Targeting Web3 Phishing Websites [PDF]

open access: yesJisuanji gongcheng
As the paradigm of ″decentralized next-generation Internet,″ Web3, relying on blockchain technology, has become an emerging field with great potential in the digital intelligence service ecosystem. However, Web3 phishing websites pose a serious threat to
LIU Ronglong, LI Ziwei, WAN Yue, WU Jiajing, JIANG Zigui
doaj   +1 more source

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

open access: yesIEEE Access, 2023
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li   +3 more
doaj   +1 more source

PHISHING URL DETECTION WEBSITE

open access: yesInternational Journal of Innovative Research in Advanced Engineering, 2022
Phishing websites are one of the types of internet security issues that target human vulnerabilities rather than software flaws. It's the technique of luring online users in order to get sensitive information like usernames and passwords. We present an intelligent technique for detecting phishing websites in this research.
Mahalakshmi BR   +3 more
openaire   +1 more source

A State-of-the-Art Review on Phishing Website Detection Techniques

open access: yesIEEE Access
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as a primary tool for attackers to deceive users and steal sensitive information.
Wenhao Li   +4 more
doaj   +1 more source

HinPhish: An Effective Phishing Detection Approach Based on Heterogeneous Information Networks

open access: yesApplied Sciences, 2021
Internet users have suffered from phishing attacks for a long time. Attackers deceive users through malicious constructed phishing websites to steal sensitive information, such as bank account numbers, website usernames, and passwords.
Bingyang Guo   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy