Results 41 to 50 of about 28,722 (249)

$1.00 per RT #BostonMarathon #PrayForBoston: analyzing fake content on Twitter [PDF]

open access: yes, 2013
This study found that 29% of the most viral content on Twitter during the Boston bombing crisis were rumors and fake content.AbstractOnline social media has emerged as one of the prominent channels for dissemination of information during real world ...
Aditi Gupta   +2 more
core   +1 more source

Phishing Attacks: Detection And Prevention

open access: yesCoRR, 2020
5 pages, 7 figures, 1 table, essential ...
openaire   +2 more sources

Machine-Learning Techniques for Predicting Phishing Attacks in Blockchain Networks: A Comparative Study

open access: yesAlgorithms, 2023
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the ...
Kunj Joshi   +6 more
doaj   +1 more source

Datasets for phishing websites detection

open access: yesData in Brief, 2020
Phishing stands for a fraudulent process, where an attacker tries to obtain sensitive information from the victim. Usually, these kinds of attacks are done via emails, text messages, or websites. Phishing websites, which are nowadays in a considerable rise, have the same look as legitimate sites.
Grega Vrbančič   +2 more
openaire   +3 more sources

DeltaPhish: Detecting Phishing Webpages in Compromised Websites

open access: yes, 2017
The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting.
AY Fu   +17 more
core   +1 more source

Assessing the impact of affective feedback on end-user security awareness [PDF]

open access: yes, 2017
A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users ...
Archibald, Jacqueline   +2 more
core   +2 more sources

AI-Based Phishing Detection and Student Cybersecurity Awareness in the Digital Age

open access: yesBig Data and Cognitive Computing
Phishing attacks are an increasingly common cybersecurity threat and are characterized by deceiving people into giving out their private credentials via emails, websites, and messages.
Zeinab Shahbazi   +2 more
doaj   +1 more source

PhishDef: URL Names Say It All

open access: yes, 2010
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis   +2 more
core   +2 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy