The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19
AF Al‐Qahtani, S Cresci - IET Information Security, 2022 - Wiley Online Library
The COVID‐19 pandemic coincided with an equally‐threatening scamdemic: a global
epidemic of scams and frauds. The unprecedented cybersecurity concerns emerged during …
epidemic of scams and frauds. The unprecedented cybersecurity concerns emerged during …
Malicious URL detection using machine learning: A survey
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Cyber threat intelligence-based malicious URL detection model using ensemble learning
Web applications have become ubiquitous for many business sectors due to their platform
independence and low operation cost. Billions of users are visiting these applications to …
independence and low operation cost. Billions of users are visiting these applications to …
Significance of machine learning for detection of malicious websites on an unbalanced dataset
It is hard to trust any data entry on online websites as some websites may be malicious, and
gather data for illegal or unintended use. For example, bank login and credit card …
gather data for illegal or unintended use. For example, bank login and credit card …
CatchPhish: detection of phishing websites by inspecting URLs
There exists many anti-phishing techniques which use source code-based features and third
party services to detect the phishing sites. These techniques have some limitations and one …
party services to detect the phishing sites. These techniques have some limitations and one …
[HTML][HTML] The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains
To design preventive policy measures for email phishing, it is helpful to be aware of the
phishing schemes and trends that are currently applied. How phishing schemes and …
phishing schemes and trends that are currently applied. How phishing schemes and …
Detection of malicious social bots using learning automata with url features in twitter network
Malicious social bots generate fake tweets and automate their social relationships either by
pretending like a follower or by creating multiple fake accounts with malicious activities …
pretending like a follower or by creating multiple fake accounts with malicious activities …
An effective cost-sensitive XGBoost method for malicious URLs detection in imbalanced dataset
S He, B Li, H Peng, J Xin, E Zhang - IEEE Access, 2021 - ieeexplore.ieee.org
Imbalanced class has been a common problem encountered in the modeling process, and
has attracted more and more attention from scholars. Biased classifiers, which limit the …
has attracted more and more attention from scholars. Biased classifiers, which limit the …
A review on privacy requirements and application layer security in internet of things (IoT)
KS Sudha, N Jeyanthi - Cybernetics and Information Technologies, 2021 - sciendo.com
Internet of Things (IoT) is the predominant emerging technology that targets on facilitating
interconnection of internet-enabled resources. IoT applications concentrate on automating …
interconnection of internet-enabled resources. IoT applications concentrate on automating …
[PDF][PDF] Understanding and analyzing appraisal systems in the underground marketplaces
An appraisal system is a feedback mechanism that has gained popularity in underground
marketplaces. This system allows appraisers, who receive free samples from vendors, to …
marketplaces. This system allows appraisers, who receive free samples from vendors, to …