[HTML][HTML] The applicability of a hybrid framework for automated phishing detection
Phishing attacks are a critical and escalating cybersecurity threat in the modern digital
landscape. As cybercriminals continually adapt their techniques, automated phishing …
landscape. As cybercriminals continually adapt their techniques, automated phishing …
Enhancing Spear Phishing Defense with AI: A Comprehensive Review and Future Directions
N Mohamed, H Taherdoost… - … on Scalable Information …, 2025 - publications.eai.eu
This paper presents a critical analysis of the role of Artificial Intelligence (AI) in defending
against spear phishing attacks, which continue to be a significant cybersecurity threat. By …
against spear phishing attacks, which continue to be a significant cybersecurity threat. By …
A Comparative Analysis of Feature Eliminator Methods to Improve Machine Learning Phishing Detection
This Machine-learning-based phishing detection employs statistical models and algorithms
to assess and recognise phishing attacks. These algorithms can learn patterns and features …
to assess and recognise phishing attacks. These algorithms can learn patterns and features …
Enhancing Phishing Detection: A Multi-Layer Ensemble Approach Integrating Machine Learning for Robust Cybersecurity
C Ahmadi, JL Chen - 2024 IEEE Symposium on Computers and …, 2024 - ieeexplore.ieee.org
Cybersecurity is a critical concern in our increasingly digital world, with phishing attacks
posing one of the most insidious threats to individual and organizational security. Although …
posing one of the most insidious threats to individual and organizational security. Although …
Alzheimer's Disease Classification Using Abnormal Hippocampal Functional Connectivity and Machine Learning
N Kanwal, N Ali, MA Al-Khasawneh… - … on Business Analytics …, 2023 - ieeexplore.ieee.org
Alzheimer's disease (AD) a neurological condition, is an illness that causes a person's
memory and other cognitive functions to deteriorate over time in a steady but slow manner …
memory and other cognitive functions to deteriorate over time in a steady but slow manner …
An Efficient ISAR Image Enrichment and Feature Abstraction of Moving Targets using Time-Frequency Transforms
TA Khan, S Zulfiqar, M Irfan - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The analysis of a time series is a key challenge in making use of the radar data. The
challenge at hand is figuring out how to get the most value out of the data by gleaning the …
challenge at hand is figuring out how to get the most value out of the data by gleaning the …
Predicting Mortgage-Backed Securities Prepayment Risk Using Machine Learning Models
P Kanimozhi, S Parkavi… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
An option to prepay a portion of a mortgage debt before it matures is included. This
alternative, known as mortgage prepayment, puts the bank that provided the home loan at …
alternative, known as mortgage prepayment, puts the bank that provided the home loan at …
The Synergy of Artificial Intelligence and Cybersecurity
A Ali, S Ahmed, M Hussain, TA Bhutta… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
As the menace of cyber threats intensifies, artificial intelligence emerges as a crucial tool for
enhancing cybersecurity. This article delves into the advantages and drawbacks of AI in …
enhancing cybersecurity. This article delves into the advantages and drawbacks of AI in …
Ransomware Attacks: Tools and Techniques for Detection
Ransomware is a sort of crypto virology virus that attempts to expose or persistently limit
access to the accused's private information until a ransom payment is made. Although some …
access to the accused's private information until a ransom payment is made. Although some …
Adaptive Defense Mechanisms Against Phishing Threats in 6G Wireless Environments
A Gaurav, BB Gupta, V Arya, KT Chui… - 2023 IEEE 98th …, 2023 - ieeexplore.ieee.org
Phishing attacks remain a persistent and evolving cybersecurity threat, particularly in the
context of 6G wireless networks. This paper introduces an innovative approach to combat …
context of 6G wireless networks. This paper introduces an innovative approach to combat …