[HTML][HTML] An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment

DJ Liu, GG Geng, XB Jin, W Wang - Computers & Security, 2021 - Elsevier
Phishing has become a favorite method of hackers for committing data theft and continues to
evolve. As long as phishing websites continue to operate, many more people and …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

The emergence threat of phishing attack and the detection techniques using machine learning models

SP Ripa, F Islam, M Arifuzzaman - … International Conference on …, 2021 - ieeexplore.ieee.org
With the increasing number of the internet users, cybercrime is increasing at a high rate.
Among all the cyber-attack, phishing has now confirmed so successful and the number one …

A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

Evaluating frontier models for dangerous capabilities

M Phuong, M Aitchison, E Catt, S Cogan… - arXiv preprint arXiv …, 2024 - arxiv.org
To understand the risks posed by a new AI system, we must understand what it can and
cannot do. Building on prior work, we introduce a programme of new" dangerous capability" …

Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective

N Azam, L Michala, S Ansari… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …

[HTML][HTML] A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in Industrial Internet of things

AM Alnajim, S Habib, M Islam, SM Thwin, F Alotaibi - Technologies, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) ecosystem faces increased risks and vulnerabilities
due to adopting Industry 4.0 standards. Integrating data from various places and converging …

Quantum secured 6G technology-based applications in Internet of Everything

K Prateek, NK Ojha, F Altaf, S Maity - Telecommunication Systems, 2023 - Springer
Scientific and technological breakthroughs carry with themselves a pertinent question—
“what's next”. The evolution of mobile networks and spectrum technology over the last two …

Whatsapp network forensics: Discovering the ip addresses of suspects

W Ahmed, F Shahzad, AR Javed… - 2021 11th IFIP …, 2021 - ieeexplore.ieee.org
Call record analysis is the most critical task for the Law Enforcement Agencies (LEAs) in a
cyber-investigation process. It provides valuable information in the investigation, such as …

A comparison of natural language processing and machine learning methods for phishing email detection

P Bountakas, K Koutroumpouchos… - Proceedings of the 16th …, 2021 - dl.acm.org
Phishing is the most-used malicious attempt in which attackers, commonly via emails,
impersonate trusted persons or entities to obtain private information from a victim. Even …