Results 81 to 90 of about 28,722 (249)

Phishing Website Detection

open access: yesIndian Journal of Data Mining
Phishing websites have emerged as a serious security risk. Phishing is the starting point for many cyberattacks that compromise the confidentiality, integrity, and availability of customer and business data. Decades of effort have gone into developing novel methods for automatically identifying phishing websites.
null Joshma K J, Vineetha Sankar P
  +5 more sources

Anti-phishing as a web-based user service [PDF]

open access: yes, 2006
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core  

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, Volume 36, Issue 3, Page 364-385, May 2026.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

open access: yesIEEE Open Journal of the Communications Society
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad   +6 more
doaj   +1 more source

Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors

open access: yes, 2018
Phishing, a continuously growing cyber threat, aims to obtain innocent users' credentials by deceiving them via presenting fake web pages which mimic their legitimate targets.
Aydos, Murat   +2 more
core   +1 more source

Balancing Digital Transformation and Modernization: Pathways for Public Managers

open access: yesPublic Administration Review, Volume 86, Issue 3, Page 610-625, May/June 2026.
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet   +4 more
wiley   +1 more source

Phishing Detection Browser

open access: yes, 2023
Phishing is a severe threat to online users, especially since attackers improve in impersonating other websites. Phishing is an act of cracking by single person or group of persons to steal the personal confidential information such as credit card details, bank account details, passwords etc., from unknown suffered for illegal activities. With websites
Agrawal, Sachin, Fandi, Nikita
openaire   +2 more sources

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

FedPhishLLM: A privacy-preserving and explainable phishing detection mechanism using federated learning and LLMs

open access: yesJournal of King Saud University: Computer and Information Sciences
Phishing attacks remain a significant cybersecurity threat, exploiting social engineering techniques to deceive users and steal sensitive information.
Wenhao Li   +2 more
doaj   +1 more source

Phish-Master: Leveraging Large Language Models for Advanced Phishing Email Generation and Detection

open access: yesApplied Sciences
Phishing emails present a significant and persistent cybersecurity threat to individuals and organizations globally due to the difficulty in detecting these malicious messages. Large Language Models (LLMs) have inadvertently intensified this challenge by
Weihong Han   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy