RETRACTED ARTICLE: An optimised homomorphic CRT-RSA algorithm for secure and efficient communication

R Abid, C Iwendi, AR Javed, M Rizwan, Z Jalil… - Personal and Ubiquitous …, 2023 - Springer
Secure and reliable exchange of information between devices is crucial for any network in
the current digital world. This information is maintained on storage devices, routing devices …

[PDF][PDF] A hybrid approach for network intrusion detection

M Mehmood, T Javed, J Nebhen, S Abbas… - CMC-Comput. Mater …, 2022 - researchgate.net
Due to the widespread use of the internet and smart devices, various attacks like intrusion,
zero-day, Malware, and security breaches are a constant threat to any organization's …

Dsmishsms-a system to detect smishing sms

S Mishra, D Soni - Neural Computing and Applications, 2023 - Springer
With the origin of smart homes, smart cities, and smart everything, smart phones came up as
an area of magnificent growth and development. These devices became a part of daily …

A novel methodology for malicious traffic detection in smart devices using BI-LSTM–CNN-dependent deep learning methodology

T Anitha, S Aanjankumar, S Poonkuntran… - Neural Computing and …, 2023 - Springer
This paper aims to propose a new technique for identifying and categorizing malevolent
Internet traffic within the context of security for smart devices. Given the rising usage of smart …

Anti-phishing: A comprehensive perspective

G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …

Detection of fake accounts on social media using multimodal data with deep learning

B Goyal, NS Gill, P Gulia, O Prakash… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In recent years, the proliferation of fake accounts on social media has become a significant
concern for individuals, organizations, and society. Fake accounts play an important role in …

[HTML][HTML] Phishing websites detection using a novel multipurpose dataset and web technologies features

M Sánchez-Paniagua, E Fidalgo, E Alegre… - Expert Systems with …, 2022 - Elsevier
Phishing attacks are one of the most challenging social engineering cyberattacks due to the
large amount of entities involved in online transactions and services. In these attacks …

Sefaced: Semantic-based forensic analysis and classification of e-mail data using deep learning

M Hina, M Ali, AR Javed, F Ghabban, LA Khan… - IEEE …, 2021 - ieeexplore.ieee.org
Artificial Intelligence (AI), in combination with the Internet of Things (IoT), called (AIoT), an
emerging trend in industrial applications, is capable of intelligent decision-making with self …

[HTML][HTML] An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment

DJ Liu, GG Geng, XB Jin, W Wang - Computers & Security, 2021 - Elsevier
Phishing has become a favorite method of hackers for committing data theft and continues to
evolve. As long as phishing websites continue to operate, many more people and …

The emergence threat of phishing attack and the detection techniques using machine learning models

SP Ripa, F Islam, M Arifuzzaman - … International Conference on …, 2021 - ieeexplore.ieee.org
With the increasing number of the internet users, cybercrime is increasing at a high rate.
Among all the cyber-attack, phishing has now confirmed so successful and the number one …