A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
Contextual security awareness: A context-based approach for assessing the security awareness of users
Assessing the information security awareness (ISA) of users is crucial for protecting systems
and organizations from social engineering attacks. Current methods do not consider the …
and organizations from social engineering attacks. Current methods do not consider the …
Malicious url detection using machine learning
FO Catak, K Sahinbas, V Dörtkardeş - … intelligence paradigms for …, 2021 - igi-global.com
Recently, with the increase in Internet usage, cybersecurity has been a significant challenge
for computer systems. Different malicious URLs emit different malicious software and try to …
for computer systems. Different malicious URLs emit different malicious software and try to …
Phishing website prediction using base and ensemble classifier techniques with cross-validation
A Awasthi, N Goel - Cybersecurity, 2022 - Springer
Internet or public internetwork has become a vulnerable place nowadays as there are so
many threats available for the novice or careless users because there exist many types of …
many threats available for the novice or careless users because there exist many types of …
PhishStack: evaluation of stacked generalization in phishing URLs detection
SSMM Rahman, T Islam, MI Jabiullah - Procedia Computer Science, 2020 - Elsevier
Stacked Generalization has been assessed and evaluated in the field of Phishing URLs
detection. This field has become egregious area of information security. Recently, different …
detection. This field has become egregious area of information security. Recently, different …
A systematic review: Detecting phishing websites using data mining models
D Jibat, S Jamjoom, QA Al-Haija… - Intelligent and …, 2023 - ieeexplore.ieee.org
As internet technology use is on the rise globally, phishing constitutes a considerable share
of the threats that may attack individuals and organizations, leading to significant losses from …
of the threats that may attack individuals and organizations, leading to significant losses from …
[PDF][PDF] Intelligent Association Classification Technique for Phishing Website Detection.
M Al-Fayoumi, J Alwidian, M Abusaif - Int. Arab J. Inf. Technol., 2020 - ccis2k.org
Many critical applications need more accuracy and speed in the decision making process.
Data mining scholars developed set of artificial automated tools to enhance the entire …
Data mining scholars developed set of artificial automated tools to enhance the entire …
Performance assessment of multiple machine learning classifiers for detecting the phishing URLs
In the field of information security, phishing URLs detection and prevention has recently
become egregious. For detecting, phishing attacks several anti-phishing systems have …
become egregious. For detecting, phishing attacks several anti-phishing systems have …
Analysis of uniform resource locator using boosting algorithms for forensic purpose
KA Apoorva, S Sangeetha - Computer Communications, 2022 - Elsevier
Innovations are taking up new roles in all fields. It still has a crucial role in Internet
technology, as the ease with which the Internet is available everywhere and accessible from …
technology, as the ease with which the Internet is available everywhere and accessible from …
Phishing Attack Detection using Collaborative Learning Approach at Dynamic Cloud Platform
RR Kalangi, KS Rao, DB Prakash… - 2023 Global …, 2023 - ieeexplore.ieee.org
The security of personal information belonging to users is a critical concern in the
technological community. Fraudsters use a variety of methods to get access to victims' …
technological community. Fraudsters use a variety of methods to get access to victims' …