The Role of AI in Cyber Security: Safeguarding Digital Identity
M Binhammad, S Alqaydi, A Othman… - Journal of …, 2024 - journal.251news.co.in
This article signals the use of Artificial Intelligence (AI) in information security where its
merits, downsides as well as unanticipated negative outcomes are noted. It considers AI …
merits, downsides as well as unanticipated negative outcomes are noted. It considers AI …
An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach
Phishing and spam have been a cybersecurity threat with the majority of breaches resulting
from these types of social engineering attacks. Therefore, detection has been a long …
from these types of social engineering attacks. Therefore, detection has been a long …
Machine Learning Based Phishing Attacks Detection Using Multiple Datasets.
AH Aljammal, A Qawasmeh… - International Journal of …, 2023 - search.ebscohost.com
Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so
an accurate phishing detection system is required. Therefore, many phishing detection …
an accurate phishing detection system is required. Therefore, many phishing detection …
A systematic literature review on phishing and anti-phishing techniques
Phishing is the number one threat in the world of internet. Phishing attacks are from decades
and with each passing year it is becoming a major problem for internet users as attackers …
and with each passing year it is becoming a major problem for internet users as attackers …
Uncovering the role of optimism bias in social media phishing: An empirical study on TikTok
W Lei, S Hu, C Hsu - Behaviour & Information Technology, 2023 - Taylor & Francis
Driven by the rapid growth and prevalent use of social media, social media phishing has
become an increasingly serious threat due to its wide-ranging disruptive potential …
become an increasingly serious threat due to its wide-ranging disruptive potential …
Privacy of web browsers: a challenge in digital forensics
A Ahmed, AR Javed, Z Jalil, G Srivastava… - … : Proceedings of the …, 2022 - Springer
Web browsers are ubiquitous applications to access public and private applications over the
Internet, Intranet, and Extranet. The increased demand for cybersecurity, including data …
Internet, Intranet, and Extranet. The increased demand for cybersecurity, including data …
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals
to unlawfully acquire sensitive user information, including passwords, account details, credit …
to unlawfully acquire sensitive user information, including passwords, account details, credit …
A deep learning assisted personalized deception system for countering web application attacks
Recent years have seen momentous growth in web attacks that has motivated researchers
to come up with sophisticated techniques to tackle them. Lately, there has been growing …
to come up with sophisticated techniques to tackle them. Lately, there has been growing …
[PDF][PDF] Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study …
K Okokpujie, CG Kennedy, K Nnodu… - International Journal …, 2023 - researchgate.net
Accepted: 1 November 2022 With the advancement in information communication
technology (ICT), cyber-attacks have become a global phenomenon, with email phishing at …
technology (ICT), cyber-attacks have become a global phenomenon, with email phishing at …
Can ai keep you safe? a study of large language models for phishing detection
Phishing attacks continue to be a pervasive challenge in cybersecurity, with threat actors
constantly developing new strategies to penetrate email inboxes and compromise sensitive …
constantly developing new strategies to penetrate email inboxes and compromise sensitive …