Results 51 to 60 of about 9,881 (133)
Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem +4 more
wiley +1 more source
Multilayer Stacked Ensemble Learning Model to Detect Phishing Websites
Phishing is a cyber attack that tricks the online users into revealing sensitive information with a fake website imitating a legitimate website. The attackers with stolen credentials not only use them for the targeted website but also can be used for ...
Lakshmana Rao Kalabarige +3 more
doaj +1 more source
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core +1 more source
Phishing Websites Detection using Python
Phishing websites is a problem on internet that target the people amenabilities rather than software vulnerabilities. It can be described as it is the process of collecting sensitive information such as usernames and passwords. Types of web pages are different in terms of their features.
Pratik Rajendra Chougule +4 more
openaire +1 more source
Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core +1 more source
Robustness Analysis of Distributed CNN Model Training in Expression Recognition
Facial expression recognition is vital in pattern recognition and affective computing. With the advancement of deep learning, its performance has improved, yet challenges remain in nonlaboratory environments due to occlusion, poor lighting, and varying head poses.
Jun Li, Jun Wan
wiley +1 more source
Phishing Techniques in Mobile Devices
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core +1 more source
Developing and evaluating a five minute phishing awareness video [PDF]
Confidence tricksters have always defrauded the unwary. The computer era has merely extended their range and made it possible for them to target anyone in the world who has an email address.
DD Caputo +16 more
core +3 more sources
Detection of Phishing Websites
Phishing is a cyber attack in which an attacker creates a copy of an existing web page to trick users into submitting personal, financial or password information, making them think that this is the real website that everyone uses. The strategy followed here is an edge server-based anti-phishing algorithm called “Link Guard” uses the property of ...
Avaneesh C S +3 more
openaire +1 more source

