A review of spam detection in social media

İ Yurtseven, S Bagriyanik… - 2021 6th International …, 2021 - ieeexplore.ieee.org
With significant usage of social media to socialize in virtual environments, bad actors are
now able to use these platforms to spread their malicious activities such as hate speech …

COVID-19 and global increases in cybersecurity attacks: review of possible adverse artificial intelligence attacks

AN Jaber, L Fritsch - 2021 25th International Computer Science …, 2021 - ieeexplore.ieee.org
The World Health Organization's (WHO) coronavirus disease dashboard has recorded over
207 million confirmed infections and over 4 million deaths. There has been an increasing …

[HTML][HTML] How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society

F Carroll, JA Adejobi, R Montasari - SN Computer science, 2022 - Springer
Phishing attacks are on the increase. The fact that our ways of living, studying and working
have drastically changed as a result of the COVID pandemic (ie, almost everything being …

[HTML][HTML] Improving the phishing website detection using empirical analysis of Function Tree and its variants

AO Balogun, KS Adewole, MO Raheem, ON Akande… - Heliyon, 2021 - cell.com
The phishing attack is one of the most complex threats that have put internet users and
legitimate web resource owners at risk. The recent rise in the number of phishing attacks has …

[HTML][HTML] ML-Based Detection of DDoS Attacks Using Evolutionary Algorithms Optimization

F Talpur, IA Korejo, AA Chandio, A Ghulam… - Sensors, 2024 - mdpi.com
The escalating reliance of modern society on information and communication technology
has rendered it vulnerable to an array of cyber-attacks, with distributed denial-of-service …

A bibliometric analysis of phishing in the Big Data Era: High focus on algorithms and low focus on people

M Pejić-Bach, I Jajić, T Kamenjarska - Procedia computer science, 2023 - Elsevier
The phishing attacks, based on social engineering to persuade potential victims to provide
valuable information, have significantly increased in the pandemic Covid-19 era …

Online Banking User Authentication Methods: A Systematic Literature Review

NA Karim, OA Khashan, H Kanaker… - IEEE …, 2023 - ieeexplore.ieee.org
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …

Adoption of artificial intelligence and robotics in organisations: a systematic literature review

AM Ala'a - International Journal of Business and Technology …, 2023 - myjms.mohe.gov.my
Organisations have increasingly used artificial intelligence (AI) to innovate and compete
successfully. Therefore, knowing the factors that affect the adoption of AI is crucial. This …

Prediction and prevention of malicious URL using ML and LR techniques for network security: machine learning

S Mythreya, ASD Murthy, K Saikumar… - Handbook of Research …, 2022 - igi-global.com
Understandable URLs are utilized to recognize billions of websites hosted over the present-
day internet. Opposition who tries to get illegal admittance to the classified data may use …

Social support for mobile security: Comparing close connections and community volunteers in a field experiment

T Mendel, E Toch - Proceedings of the 2023 CHI Conference on Human …, 2023 - dl.acm.org
People regularly rely on social support from family, friends, and the public when mitigating
security and privacy risks, even if mainstream technologies hardly support these …