[HTML][HTML] An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment
Phishing has become a favorite method of hackers for committing data theft and continues to
evolve. As long as phishing websites continue to operate, many more people and …
evolve. As long as phishing websites continue to operate, many more people and …
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …
professional network administration support, while sophisticated attacks pose enormous …
The emergence threat of phishing attack and the detection techniques using machine learning models
SP Ripa, F Islam, M Arifuzzaman - … International Conference on …, 2021 - ieeexplore.ieee.org
With the increasing number of the internet users, cybercrime is increasing at a high rate.
Among all the cyber-attack, phishing has now confirmed so successful and the number one …
Among all the cyber-attack, phishing has now confirmed so successful and the number one …
A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …
the social and economic well-being of users. The escalation in dependency upon the …
Evaluating frontier models for dangerous capabilities
To understand the risks posed by a new AI system, we must understand what it can and
cannot do. Building on prior work, we introduce a programme of new" dangerous capability" …
cannot do. Building on prior work, we introduce a programme of new" dangerous capability" …
Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …
life including smart homes, smart cities, healthcare services, and autonomous systems …
[HTML][HTML] A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in Industrial Internet of things
The Industrial Internet of Things (IIoT) ecosystem faces increased risks and vulnerabilities
due to adopting Industry 4.0 standards. Integrating data from various places and converging …
due to adopting Industry 4.0 standards. Integrating data from various places and converging …
Quantum secured 6G technology-based applications in Internet of Everything
Scientific and technological breakthroughs carry with themselves a pertinent question—
“what's next”. The evolution of mobile networks and spectrum technology over the last two …
“what's next”. The evolution of mobile networks and spectrum technology over the last two …
Whatsapp network forensics: Discovering the ip addresses of suspects
Call record analysis is the most critical task for the Law Enforcement Agencies (LEAs) in a
cyber-investigation process. It provides valuable information in the investigation, such as …
cyber-investigation process. It provides valuable information in the investigation, such as …
A comparison of natural language processing and machine learning methods for phishing email detection
P Bountakas, K Koutroumpouchos… - Proceedings of the 16th …, 2021 - dl.acm.org
Phishing is the most-used malicious attempt in which attackers, commonly via emails,
impersonate trusted persons or entities to obtain private information from a victim. Even …
impersonate trusted persons or entities to obtain private information from a victim. Even …