Results 101 to 110 of about 9,881 (133)

A Lightweight Anti-Phishing Technique for Mobile Phone

open access: yesActa Informatica Pragensia, 2017
Mobile phones have become an essential device for accessing the web. This is due to the advantages of portability, lower cost and ease. However, the adoption of mobile phones for online activities is now being challenged by myriads of cybercrimes. One of
Abdul Abiodun Orunsolu   +4 more
doaj   +1 more source

Phishing Website Detection Using Deep Learning

open access: yesInternational Journal of Scientific Research in Engineering and Management
Abstract Phishing attacks are one of the most common ways cybercrimes such as the targeting of sensitive information, email, passwords, and bank detail occur. These are the fake websites designed to look just like real ones, which makes them hard to detect.
Suryakant Suryakant   +3 more
openaire   +1 more source

Intelligent phishing website detection: A CNN-SVM approach with nature-inspired hyperparameter tuning

open access: yesCyber Security and Applications
Phishing attacks represent a growing threat to online users and software developers, necessitating the development of advanced detection strategies. This study proposes a hybrid framework that integrates convolutional neural networks (CNN) for feature ...
Santosh Kumar Birthriya   +2 more
doaj   +1 more source

Phishing Website Detection Using Deep Learning Models

open access: yesIEEE Access
This research addresses the imperative need for advanced detection mechanisms for the identification of phishing websites. For this purpose, we explore state-of-the-art machine learning, ensemble learning, and deep learning algorithms.
Ume Zara   +5 more
doaj   +1 more source

Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]

open access: yes
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core  

Tree-based Ensemble Machine Learning for Phishing Website Detection

open access: yesKomputika
Phishing remains a prevalent and perilous cyber threat in the digital age, exploiting human vulnerabilities to deceive individuals into disclosing sensitive information. This paper presents a method to achieve high accuracy in phishing website detection
Husni Fadhilah   +2 more
doaj   +1 more source

Phishing detection algorithm based on attention and feature fusion

open access: yes网络与信息安全学报
Phishing has been the primary means utilized by attackers to conduct cyber fraud. As national anti-cyber fraud efforts continue to increase, the technical confrontation of various phishing activities has also escalated, bringing significant pressure to ...
Sirui ZHANG, Zhiwei YAN, Kejun DONG, Xuebiao YUCHI
doaj   +3 more sources

World-wide cloaking phishing websites detection

open access: yes, 2018
Most known anti-phishing tools are based in “black-list” system and http headers, but some phishing sites have been used web cloaking technique to avoid possible detection. These kinds pf phishing websites have an officially and trustful web content at ordinary times but triggered by some specific keyword on search engines.
openaire   +3 more sources

Improving phishing email detection performance through deep learning with adaptive optimization

open access: yesScientific Reports
Phishing email attacks are becoming increasingly sophisticated, placing a heavy burden on cybersecurity, which requires more advanced detection techniques. Attackers often craft emails that closely resemble those from trusted sources, making it difficult
Mehdi Hosseinzadeh   +7 more
doaj   +1 more source

Feature Engineering for Phishing Website Detection Using Machine Learning: A Systematic Review

open access: yesIEEE Access
Phishing website detection has been widely explored, yet most existing surveys focus on detection algorithms or general cybersecurity methods, offering only a brief treatment of feature engineering. This systematic literature review addresses this gap by
Yanche Ari Kustiawan   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy