Results 41 to 50 of about 7,255 (230)

Survey on Ethereum phishing detection technology

open access: yes网络与信息安全学报, 2023
With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high ...
Zhao CAI, Tao JING, Shuang REN
doaj   +1 more source

Balancing Digital Transformation and Modernization: Pathways for Public Managers

open access: yesPublic Administration Review, EarlyView.
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet   +4 more
wiley   +1 more source

Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning

open access: yesIEEE Access, 2019
As a crime of employing technical means to steal sensitive information of users, phishing is currently a critical threat facing the Internet, and losses due to phishing are growing steadily.
Peng Yang, Guangzhen Zhao, Peng Zeng
doaj   +1 more source

Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions

open access: yesIET Networks, 2020
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly.
M. Vijayalakshmi   +3 more
doaj   +1 more source

Particle Swarm Optimization-Based Feature Weighting for Improving Intelligent Phishing Website Detection

open access: yesIEEE Access, 2020
Over the last few years, web phishing attacks have been constantly evolving causing customers to lose trust in e-commerce and online services. Various tools and systems based on a blacklist of phishing websites are applied to detect the phishing websites.
Waleed Ali, Sharaf Malebary
doaj   +1 more source

“I Paid A Bribe”—Lessons and Insights From Crowdsourced Corruption Reporting in India

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Preventing and reducing corruption has proven to be an enormous challenge. An important step in this process is to produce and use good metrics to identify where anti‐corruption resources would be most beneficial. Most measures of corruption, however, rely on surveys of perceptions or bribery incidence.
Ina Kubbe   +2 more
wiley   +1 more source

Enhancing Phishing Email Detection through Ensemble Learning and Undersampling

open access: yesApplied Sciences, 2023
In real-world scenarios, the number of phishing and benign emails is usually imbalanced, leading to traditional machine learning or deep learning algorithms being biased towards benign emails and misclassifying phishing emails.
Qinglin Qi   +4 more
doaj   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

A systematic literature review on phishing website detection techniques

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain sensitive information from an internet user. In this Systematic Literature Survey (SLR), different phishing detection approaches, namely Lists Based, Visual ...
Asadullah Safi, Satwinder Singh
doaj   +1 more source

Phishing or Not Phishing? A Survey on the Detection of Phishing Websites

open access: yesIEEE Access, 2023
Phishing is a security threat with serious effects on individuals as well as on the targeted brands. Although this threat has been around for quite a long time, it is still very active and successful. In fact, the tactics used by attackers have been evolving continuously in the years to make the attacks more convincing and effective.
Rasha Zieni   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy