Results 71 to 80 of about 7,255 (230)

Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning

open access: yesFrontiers in Computer Science
IntroductionThe dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge.
Maruf A. Tamal   +4 more
doaj   +1 more source

URL Based Phishing Detection

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
Damage caused due to phishing attacks is that which targets the user's personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people ...
Neeraja Koppula   +2 more
openaire   +1 more source

OFF-The-Hook: A Tool to Detect Zero-Font and Traditional Phishing Attacks in Real Time

open access: yesApplied System Innovation
Phishing attacks continue to pose serious challenges to cybersecurity, with attackers constantly refining their methods to bypass detection systems. One particularly evasive technique is Zero-Font phishing, which involves the insertion of invisible or ...
Nazar Abbas Saqib   +9 more
doaj   +1 more source

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism

open access: yesIEEE Access, 2019
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang   +4 more
doaj   +1 more source

Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking

open access: yesIEEE Access, 2018
Phishing is one of the most harmful social engineering techniques to subdue end users where threat actors find a chance to gain access to critical information systems.
Tommy Chin, Kaiqi Xiong, Chengbin Hu
doaj   +1 more source

PhishOFE: A Novel Machine Learning Framework for Real-Time Phishing URL Detection With Optimized Feature Engineering

open access: yesIEEE Access
With the rapid expansion of the internet and the growing sophistication of cyber threats, phishing attacks have become a serious cybersecurity challenge for individuals and organizations.
Yanche Ari Kustiawan   +1 more
doaj   +1 more source

AI-Driven Phishing Detection: Enhancing Cybersecurity with Reinforcement Learning

open access: yesJournal of Cybersecurity and Privacy
Phishing remains a persistent cybersecurity threat, often bypassing traditional detection methods due to evolving attack techniques. This study presents a Reinforcement Learning (RL)-based phishing detection framework, leveraging a Deep Q-Network (DQN ...
Haidar Jabbar, Samir Al-Janabi
doaj   +1 more source

Home - About - Disclaimer - Privacy