[PDF][PDF] A Bayesian attack-network modeling approach to mitigating malware-based banking cyberattacks
A Zimba - Int J Comput Netw Inf Secur, 2022 - academia.edu
According to Cybersecurity Ventures, the damage related to cybercrime is projected to reach
$6 trillion annually by 2021. The majority of the cyberattacks are directed at financial …
$6 trillion annually by 2021. The majority of the cyberattacks are directed at financial …
Analysis of e‐Mail Spam Detection Using a Novel Machine Learning‐Based Hybrid Bagging Technique
A Rayan - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
e‐mail service providers and consumers find it challenging to distinguish between spam and
nonspam e‐mails. The purpose of spammers is to spread false information by sending …
nonspam e‐mails. The purpose of spammers is to spread false information by sending …
A Review on Machine Learning Techniques for Image Based Spam Emails Detection
M Abdullahi, AD Mohammed, SA Bashir… - 2020 IEEE 2nd …, 2021 - ieeexplore.ieee.org
Sending and receiving e-mails have continued to take the lead being the easiest and fastest
way of e-communication despite the presence of other forms of e-communication such as …
way of e-communication despite the presence of other forms of e-communication such as …
Existing Spam Filtering Methods Considering different technique: A review
Today, social media and email are become a very common and the most effective medium
for communication and data transferring which has been greatly affected by undesired spam …
for communication and data transferring which has been greatly affected by undesired spam …
Mobile phone forensics: an investigative framework based on user impulsivity and secure collaboration errors
M Petraityte, A Dehghantanha, G Epiphaniou - … Forensic Investigations of …, 2017 - Elsevier
This paper uses a scenario-based, role-play experiment based on the usage of QR codes to
detect how mobile users respond to social engineering attacks conducted via mobile …
detect how mobile users respond to social engineering attacks conducted via mobile …
Comparative evaluation of techniques for detection of phishing URLs
One of the popular cyberattacks today is phishing. It combines social engineering and online
identity theft to delude Internet users into submitting their personal information to …
identity theft to delude Internet users into submitting their personal information to …
A mechanism to detect Urdu spam emails
A Akhtar, GR Tahir, K Shakeel - 2017 IEEE 8th Annual …, 2017 - ieeexplore.ieee.org
Electronic mail (Email) is being used for communication in all over the world as a basic
communicational media. Few decades ago English was the only language of email but now …
communicational media. Few decades ago English was the only language of email but now …
[PDF][PDF] E-mail spam detection using refined mlp with feature selection
Electronic Mail (E-mail) has established a significant place in information user's life. E-Mails
are used as a major and important mode of information sharing because emails are faster …
are used as a major and important mode of information sharing because emails are faster …
Using an artificial neural network to improve email security
MAAM Maki, S Subramanian - … Intelligence Techniques for Security …, 2020 - igi-global.com
Email is one of the most widely used features of internet, and it is the most convenient
method of transferring messages electronically. However, email productivity has been …
method of transferring messages electronically. However, email productivity has been …
[PDF][PDF] K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration
Electronic spam is a highly concerning phenomenon over the internet affecting various
organisations like Google, Yahoo etc. Email spam causes several serious problems like …
organisations like Google, Yahoo etc. Email spam causes several serious problems like …