Results 81 to 90 of about 9,881 (133)

PhishingWebCollector: Async python library for automated phishing feed collection

open access: yesSoftwareX
Website phishing represents a significant cyber threat, where attackers create fraudulent websites that imitate legitimate sites to deceive users. Continuous monitoring and detection of malicious websites are crucial for mitigating this threat.
Damian Frąszczak, Edyta Frąszczak
doaj   +1 more source

2025 Japanese Heart Rhythm Society / Japanese Circulation Society Consensus Statement on the Appropriate Use of Ambulatory and Wearable Electrocardiographs

open access: yesJournal of Arrhythmia, Volume 41, Issue 3, June 2025.
Recently, some clinicians have been diagnosing and treating arrhythmias on the basis of electrocardiogram (ECG) devices with low accuracy. In Europe and the US, several statements on the use of ECGs have already been published by related academic societies.
Takanori Ikeda   +22 more
wiley   +1 more source

Regulating Tools for Hacking: Limitations, Challenges and Possibilities

open access: yesPolicy &Internet, Volume 17, Issue 2, June 2025.
ABSTRACT Tools developed for the purpose of unilaterally exploiting computer systems and their communications will pose a persistent policy and regulatory problem. Regulation of hacking tools to date, however, has been piecemeal, inconsistent and often incoherent.
Diarmaid Harkin, Vas Panagiotopoulos
wiley   +1 more source

Multi‐country perspectives on best practices and barriers to preference elicitation lab‐in‐the‐field experiments with farmers

open access: yesApplied Economic Perspectives and Policy, Volume 47, Issue 2, Page 723-746, May 2025.
Abstract In this study, we define, categorize, and systematically describe best practices and barriers to implementing preference elicitation lab‐in‐the‐field experiments with farmers based on qualitative, in‐depth interviews with researchers from the Research Network on Economic Experiments for the Common Agricultural Policy (REECAP).
Marieke Cornelia Baaken   +16 more
wiley   +1 more source

ChatPhishDetector: Detecting Phishing Sites Using Large Language Models

open access: yesIEEE Access
Large Language Models (LLMs), such as ChatGPT, are significantly impacting various fields. While LLMs have been extensively studied for code generation and text synthesis, their application in detecting malicious web content, particularly phishing sites,
Takashi Koide   +2 more
doaj   +1 more source

A Survey on Internet of Medical Things (IoMT): Enabling Technologies, Security and Explainability Issues, Challenges, and Future Directions

open access: yesExpert Systems, Volume 42, Issue 5, May 2025.
ABSTRACT Internet of Medical Things (IoMT) paradigm refers to the process of collection, transmission and analysis of healthcare data using communication and information systems over the internet. IoMT consist of medical devices that can link to the internet or other networks, including wearables, sensors, monitoring tools and other medical appliances.
Mert Melih Ozcelik   +2 more
wiley   +1 more source

A Holistic View of Identity Theft Tax Refund Fraud [PDF]

open access: yes, 2019
This thesis attempts to explain what identity theft tax refund fraud is and how the issue has developed over the years. It presents a holistic, historic view of the problem as well as how it has been addressed.
Hultgren, Andrew J
core   +2 more sources

Phishing Website Detection using Machine Learning

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2021
Phishing is not a legal activity, in this people are misguided into the wrong websites using various types of fraudulent methods. The main objective of this phishing websites is to seize all personal information or financial details for own personal benefits or misuse.
openaire   +1 more source

Reality Winners

open access: yes
Critical Quarterly, Volume 67, Issue 4, Page 153-195, December 2025.
Lee Grieveson
wiley   +1 more source

Safer Online Lives: Internet Use and Online Experiences of Adults With Intellectual Disabilities—A Survey Study

open access: yesJournal of Applied Research in Intellectual Disabilities, Volume 38, Issue 3, May 2025.
ABSTRACT Background and Aims The internet and social media are increasingly accessible to people with intellectual disabilities, offering significant benefits but also posing unique challenges and risks. This study aimed to explore the online experiences of adults with intellectual disabilities in England.
Paraskevi Triantafyllopoulou   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy