Results 41 to 50 of about 4,265,497 (230)

Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study

open access: yesAlgorithms, 2023
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the ...
Kunj Joshi   +6 more
doaj   +1 more source

Intelligent phishing website detection system using fuzzy techniques. [PDF]

open access: yes, 2008
Phishing websites are forged web pages that are created by malicious people to mimic web pages of real websites and it attempts to defraud people of their personal information.
Aburrous, Maher R.   +3 more
core   +1 more source

Assessing the impact of affective feedback on end-user security awareness [PDF]

open access: yes, 2017
A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users ...
Archibald, Jacqueline   +2 more
core   +2 more sources

$1.00 per RT #BostonMarathon #PrayForBoston: analyzing fake content on Twitter [PDF]

open access: yes, 2013
This study found that 29% of the most viral content on Twitter during the Boston bombing crisis were rumors and fake content.AbstractOnline social media has emerged as one of the prominent channels for dissemination of information during real world ...
Aditi Gupta   +2 more
core   +1 more source

DeltaPhish: Detecting Phishing Webpages in Compromised Websites

open access: yes, 2017
The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting.
AY Fu   +17 more
core   +1 more source

Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models

open access: yesMachine Learning and Knowledge Extraction
Large Language Models (LLMs) are reshaping the landscape of Machine Learning (ML) application development. The emergence of versatile LLMs capable of undertaking a wide array of tasks has reduced the necessity for intensive human involvement in training ...
Fouad Trad, Ali Chehab
semanticscholar   +1 more source

Survey on phishing detection research

open access: yes网络与信息安全学报, 2020
With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats ...
Xi FU, Hui LI, Xingwen ZHAO
doaj   +3 more sources

AI-Based Phishing Detection and Student Cybersecurity Awareness in the Digital Age

open access: yesBig Data and Cognitive Computing
Phishing attacks are an increasingly common cybersecurity threat and are characterized by deceiving people into giving out their private credentials via emails, websites, and messages.
Zeinab Shahbazi   +2 more
doaj   +1 more source

People have different expectations for their own versus others' use of AI‐mediated communication tools

open access: yesBritish Journal of Psychology, EarlyView.
Abstract Artificial intelligence (AI) can enhance human communication, for example, by improving the quality of our writing, voice or appearance. However, AI mediated communication also has risks—it may increase deception, compromise authenticity or yield widespread mistrust. As a result, both policymakers and technology firms are developing approaches
Zoe A. Purcell   +4 more
wiley   +1 more source

DEPHIDES: Deep Learning Based Phishing Detection System

open access: yesIEEE Access
In today’s digital landscape, the increasing prevalence of internet-connected devices, including smartphones, personal computers, and IoT devices, has enabled users to perform a wide range of daily activities such as shopping, banking, and communication ...
O. K. Sahingoz   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy