Results 81 to 90 of about 4,265,497 (230)

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

A Literature Survey on Potential Private User Information Leakage in Metaverse Applications

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 1, January 2026.
This survey explores potential privacy risks in the Metaverse, focusing on personal data inferred from virtual reality headsets embedded with passive brain‐computer interfaces (BCI). It reviews how age, gender, and ethnicity can be predicted using neurophysiological signals, (e.g., electroencephalogram). The survey also explores future threats from non‐
Mina Jaberi, Tiago H. Falk
wiley   +1 more source

Detecting Phishing Web Pages

open access: yesInternational Journal of Computer Applications, 2015
Phishing is basically stealing users personal information (e.g. stealing credit card information or using users banking passwords without any information to the user). Phishing can also be done by making fake web pages as similar as the real, legitimate page and when the user fills information asked in those web pages, they become victim of phishers ...
Aniket Nayakawadi   +2 more
openaire   +1 more source

bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

open access: yes, 2014
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama   +2 more
core   +1 more source

Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems [PDF]

open access: yes, 2017
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only.
Barraclough, Phoebe, Fehringer, Gerhard
core   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

The applicability of a hybrid framework for automated phishing detection

open access: yesComputers & security
attacks are a critical and escalating cybersecurity threat in the modern digital landscape.
R. J. V. Geest   +3 more
semanticscholar   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs) [PDF]

open access: yes, 2020
The emergence of online services in our daily lives has been accompanied by a range of malicious attempts to trick individuals into performing undesired actions, often to the benefit of the adversary. The most popular medium of these attempts is phishing attacks, particularly through emails and websites.
Halgas, L, Agrafiotis, I, Nurse, J
openaire   +2 more sources

One Step Forward, Two Steps Back: Managing Uncertainties in Outcomes, Deliverables, and Means in Behavioral Intervention Development Projects

open access: yesJournal of Operations Management, Volume 72, Issue 1, Page 81-107, January 2026.
ABSTRACT We take an extended perspective on project success that includes post‐project outcomes as well as at‐end and during‐project success. To manage projects accordingly, we conceptualize three corresponding orders of uncertainty (outcomes, deliverables, and means uncertainties).
Philip Cash   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy