Results 31 to 40 of about 28,722 (249)

PhiDMA – A phishing detection model with multi-filter approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site.
Gunikhan Sonowal, K.S. Kuppusamy
doaj   +1 more source

Developing and evaluating a five minute phishing awareness video [PDF]

open access: yes, 2018
Confidence tricksters have always defrauded the unwary. The computer era has merely extended their range and made it possible for them to target anyone in the world who has an email address.
DD Caputo   +16 more
core   +3 more sources

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

open access: yesIEEE Access, 2023
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li   +3 more
doaj   +1 more source

HinPhish: An Effective Phishing Detection Approach Based on Heterogeneous Information Networks

open access: yesApplied Sciences, 2021
Internet users have suffered from phishing attacks for a long time. Attackers deceive users through malicious constructed phishing websites to steal sensitive information, such as bank account numbers, website usernames, and passwords.
Bingyang Guo   +5 more
doaj   +1 more source

A State-of-the-Art Review on Phishing Website Detection Techniques

open access: yesIEEE Access
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as a primary tool for attackers to deceive users and steal sensitive information.
Wenhao Li   +4 more
doaj   +1 more source

A review of organization-oriented phishing research [PDF]

open access: yesPeerJ Computer Science
The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users ...
Kholoud Althobaiti, Nawal Alsufyani
doaj   +2 more sources

Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems [PDF]

open access: yes, 2017
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only.
Barraclough, Phoebe, Fehringer, Gerhard
core   +1 more source

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites

open access: yesIEEE Access, 2020
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet.
Yazan Ahmad Alsariera   +3 more
doaj   +1 more source

Survey on phishing detection research

open access: yes网络与信息安全学报, 2020
With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats ...
Xi FU, Hui LI, Xingwen ZHAO
doaj   +3 more sources

Home - About - Disclaimer - Privacy