Results 61 to 70 of about 4,265,497 (230)

Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions

open access: yesIET Networks, 2020
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly.
M. Vijayalakshmi   +3 more
doaj   +1 more source

Particle Swarm Optimization-Based Feature Weighting for Improving Intelligent Phishing Website Detection

open access: yesIEEE Access, 2020
Over the last few years, web phishing attacks have been constantly evolving causing customers to lose trust in e-commerce and online services. Various tools and systems based on a blacklist of phishing websites are applied to detect the phishing websites.
Waleed Ali, Sharaf Malebary
doaj   +1 more source

Phish-IDetector: Message-Id Based Automatic Phishing Detection

open access: yesProceedings of the 12th International Conference on Security and Cryptography, 2015
Phishing attacks are a well known problem in our age of electronic communication. Sensitive information like credit card details, login credentials for account, etc. are targeted by phishers. Emails are the most common channel for launching phishing attacks.
Nirmala Rai, Rakesh M. Verma
openaire   +1 more source

Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page

open access: yes, 2014
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

Website Phishing Detection Using Machine Learning Techniques

open access: yesJournal of Statistics Applications & Probability
: Phishing is a cybercrime that is constantly increasing in the recent years due to the increased use of the Internet and its applications. It is one of the most common types of social engineering that aims to disclose or steel users sensitive or ...
R. Alazaidah   +7 more
semanticscholar   +1 more source

Attention-Based 1D CNN-BiLSTM Hybrid Model Enhanced with FastText Word Embedding for Korean Voice Phishing Detection

open access: yesMathematics, 2023
In the increasingly complex domain of Korean voice phishing attacks, advanced detection techniques are paramount. Traditional methods have achieved some degree of success.
Milandu Keith Moussavou Boussougou   +1 more
semanticscholar   +1 more source

Survey on Ethereum phishing detection technology

open access: yes网络与信息安全学报, 2023
With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high ...
Zhao CAI, Tao JING, Shuang REN
doaj   +1 more source

PhishDef: URL Names Say It All

open access: yes, 2010
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs.
Faloutsos, Michalis   +2 more
core   +2 more sources

Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy