Results 91 to 100 of about 9,881 (133)
Detecting phishing website using Pattern Mining
Abstract Nowadays users are purchasing products and payments through online. While using these websites they will ask for the information of the users like username and password etc. There are some websites which are used to hack the details of the user. This type of websites is called phishing websites.
B Sreelekha, B Harika, Mrs.L. Sujihelen
openaire +1 more source
Managing cyberattacks in wartime: The case of Ukraine
Abstract Cybersecurity specialists face continual challenges in protecting organizations and societies from ever‐evolving cyberattacks. These challenges intensify dramatically in the context of war, yet our understanding of cyberattacks during wartime is limited.
Iryna Fyshchuk +2 more
wiley +1 more source
Cyber-crime Science = Crime Science + Information Security [PDF]
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter +2 more
core +2 more sources
Cybersecurity and Data Protection Practices Among Australian Dermatologists
Australasian Journal of Dermatology, Volume 66, Issue 7, Page e474-e480, November 2025.
Nicole Kah Mun Yoong +2 more
wiley +1 more source
Design of Efficient Phishing Detection Model using Machine Learning
Recently, there have been cases of phishing attempts to steal personal information through fake sites disguised as major sites. Although phishing attacks continue and increase, countermeasures remain in the form of defense after identifying the attack ...
Bong-Hyun Kim
doaj +1 more source
Anti-phishing as a web-based user service [PDF]
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core
An Evasion Attack against ML-based Phishing URL Detectors
Background: Over the year, Machine Learning Phishing URL classification (MLPU) systems have gained tremendous popularity to detect phishing URLs proactively. Despite this vogue, the security vulnerabilities of MLPUs remain mostly unknown. Aim: To address
Babar, M. Ali, Gaire, Raj, Sabir, Bushra
core
Investigation of Attitudes Towards Security Behaviors [PDF]
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Internet Security Report stated that two out of the top three causes of data breaches in 2012 were attributable to human error (Pelgrin, 2014).
Kelley, Daniel
core +1 more source
Detecting and characterizing lateral phishing at scale [PDF]
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A +7 more
core +2 more sources
Recent advancements in Artificial Intelligence (AI) have greatly impacted cybersecurity, particularly in detecting phishing websites. Traditional methods struggle to address evolving vulnerabilities, but research shows that Machine Learning (ML ...
Phan The Duy +5 more
doaj +1 more source

