Results 51 to 60 of about 28,722 (249)

Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment

open access: yesAlexandria Engineering Journal
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri   +7 more
doaj   +1 more source

Intelligent Ensemble Learning Approach for Phishing Website Detection Based on Weighted Soft Voting

open access: yesMathematics, 2021
The continuous development of network technologies plays a major role in increasing the utilization of these technologies in many aspects of our lives, including e-commerce, electronic banking, social media, e-health, and e-learning.
Altyeb Taha
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting

open access: yesSystems Engineering, EarlyView.
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley   +1 more source

bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

open access: yes, 2014
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama   +2 more
core   +1 more source

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]

open access: yes, 2019
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean   +5 more
core   +3 more sources

Phishing Website Detection

open access: yesInternational Journal of Scientific Research in Science and Technology, 2022
It is a crime to practice phishing by employing technical tricks and social engineering to exploit the innocence of unaware users. This methodology usually covers up a trustworthy entity so as to influence a consumer to execute an action if asked by the imitated entity.
null Mr. Tahir Naquash H B   +4 more
openaire   +1 more source

DQN‐Guided Subset‐Induced OCSVM Kernel Approximation for Imbalanced Anomaly Detection

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
Anomaly detection under limited normal data remains a fundamental challenge due to severe class imbalance and scarcity of anomalies. We propose a novel framework that reformulates support vector selection in One‐Class SVM as a sequential decision‐making problem.
Wenqian Yu, Jiaying Wu, Jinglu Hu
wiley   +1 more source

Enhancing Phishing Email Detection through Ensemble Learning and Undersampling

open access: yesApplied Sciences, 2023
In real-world scenarios, the number of phishing and benign emails is usually imbalanced, leading to traditional machine learning or deep learning algorithms being biased towards benign emails and misclassifying phishing emails.
Qinglin Qi   +4 more
doaj   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Home - About - Disclaimer - Privacy