[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review

B Naqvi, K Perova, A Farooq, I Makhdoom… - Computers & …, 2023 - Elsevier
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …

[Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review

A Cheema, M Tariq, A Hafiz, MM Khan… - Security and …, 2022 - Wiley Online Library
The Distributed Denial of Service (DDoS) attack is one of the most critical issues in network
security. These sorts of attacks pose a noteworthy danger to the accessibility of network …

Cybersecurity challenges in blockchain technology: A scoping review

S Mahmood, M Chadhar… - Human Behavior and …, 2022 - Wiley Online Library
Blockchain technology (BCT) is an emerging technology. Cybersecurity challenges in BCT
are being explored to add greater value to business processes and reshape business …

Data mining techniques to analyze the impact of social media on academic performance of high school students

S Amjad, M Younas, M Anwar… - Wireless …, 2022 - Wiley Online Library
The main purpose of educational institutions is to provide quality education to their students.
However, it is difficult to analyze large data manually. Educational data mining is more …

[Retracted] Transfer Learning Auto‐Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices

U Shafiq, MK Shahzad, M Anwar… - Security and …, 2022 - Wiley Online Library
Machine Learning based anomaly detection ap‐proaches have long training and validation
cycles. With IoT devices rapidly proliferating, training anomaly models on a per device basis …

An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review

V Chithanuru, M Ramaiah - Concurrency and Computation …, 2023 - Wiley Online Library
Recently, Blockchain cryptographic distributed transaction ledger technology finds its usage
in many applications. The application's ledgers implemented through Blockchain, ensures …

Wireless Technology Security and Privacy: A Comprehensive Study

H Azam, M Tan, LT Pin, MA Syahmi, ALW Qian… - 2023 - preprints.org
Since the advent of the Internet, there has been a significant shift from wired to wireless
communication between devices. The volume of data transmitted has surged, primarily …

Tips, tricks, and training: Supporting anti-phishing awareness among mid-career office workers based on employees' current practices

AC Tally, J Abbott, AM Bochner, S Das… - Proceedings of the …, 2023 - dl.acm.org
Preventing workplace phishing depends on the actions of every employee, regardless of
cybersecurity expertise. Based on 24 semi-structured interviews with mid-career office …

Web simplification prototype for cognitive disabled users

M Kamran, M Malik, MW Iqbal, M Anwar… - Human Behavior …, 2022 - Wiley Online Library
Information and communication technology (ICT) and World Wide Web (WWW) are
increasingly being used in daily life and becoming important in community, business …

Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge

J Al-Sawwa, M Almseidin, M Alkasassbeh… - Cluster …, 2024 - Springer
Nowadays, phishing attacks have grown rapidly, and there is an urgent need to introduce a
suitable detection method that has the ability to detect different types of phishing attacks …