Results 51 to 60 of about 9,881 (133)

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Multilayer Stacked Ensemble Learning Model to Detect Phishing Websites

open access: yesIEEE Access, 2022
Phishing is a cyber attack that tricks the online users into revealing sensitive information with a fake website imitating a legitimate website. The attackers with stolen credentials not only use them for the targeted website but also can be used for ...
Lakshmana Rao Kalabarige   +3 more
doaj   +1 more source

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

Phishing Websites Detection using Python

open access: yes, 2020
Phishing websites is a problem on internet that target the people amenabilities rather than software vulnerabilities. It can be described as it is the process of collecting sensitive information such as usernames and passwords. Types of web pages are different in terms of their features.
Pratik Rajendra Chougule   +4 more
openaire   +1 more source

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page

open access: yes, 2014
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core   +1 more source

Robustness Analysis of Distributed CNN Model Training in Expression Recognition

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

Developing and evaluating a five minute phishing awareness video [PDF]

open access: yes, 2018
Confidence tricksters have always defrauded the unwary. The computer era has merely extended their range and made it possible for them to target anyone in the world who has an email address.
DD Caputo   +16 more
core   +3 more sources

Detection of Phishing Websites

open access: yesInternational Journal of Innovative Science and Research Technology (IJISRT)
Phishing is a cyber attack in which an attacker creates a copy of an existing web page to trick users into submitting personal, financial or password information, making them think that this is the real website that everyone uses. The strategy followed here is an edge server-based anti-phishing algorithm called “Link Guard” uses the property of ...
Avaneesh C S   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy