An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A …
Phishing is one of the most effective ways in which cybercriminals get sensitive details such
as credentials for online banking, digital wallets, state secrets, and many more from potential …
as credentials for online banking, digital wallets, state secrets, and many more from potential …
Anti-phishing: A comprehensive perspective
G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …
information related to individuals and organizations fraudulently. Although Phishing attacks …
Cyber threat intelligence-based malicious URL detection model using ensemble learning
Web applications have become ubiquitous for many business sectors due to their platform
independence and low operation cost. Billions of users are visiting these applications to …
independence and low operation cost. Billions of users are visiting these applications to …
An intelligent identification and classification system for malicious uniform resource locators (URLs)
Q Abu Al-Haija, M Al-Fayoumi - Neural Computing and Applications, 2023 - Springer
Abstract Uniform Resource Locator (URL) is a unique identifier composed of protocol and
domain name used to locate and retrieve a resource on the Internet. Like any Internet …
domain name used to locate and retrieve a resource on the Internet. Like any Internet …
Multimodel phishing url detection using lstm, bidirectional lstm, and gru models
In today's world, phishing attacks are gradually increasing, resulting in individuals losing
valuables, assets, personal information, etc., to unauthorized parties. In phishing, attackers …
valuables, assets, personal information, etc., to unauthorized parties. In phishing, attackers …
CCrFS: combine correlation features selection for detecting phishing websites using machine learning
Internet users are continually exposed to phishing as cybercrime in the 21st century. The
objective of phishing is to obtain sensitive information by deceiving a target and using the …
objective of phishing is to obtain sensitive information by deceiving a target and using the …
A large-scale pretrained deep model for phishing url detection
Y Wang, W Zhu, H Xu, Z Qin, K Ren… - ICASSP 2023-2023 …, 2023 - ieeexplore.ieee.org
Phishing attacks have always been a security issue that has attracted great attention in the
cyber security community. Recently, the famous pre-trained models is being used as an anti …
cyber security community. Recently, the famous pre-trained models is being used as an anti …
Classifying swahili smishing attacks for mobile money users: A machine-learning approach
Due to the massive adoption of mobile money in Sub-Saharan countries, the global
transaction value of mobile money exceeded 2 billion in 2021. Projections show transaction …
transaction value of mobile money exceeded 2 billion in 2021. Projections show transaction …
[PDF][PDF] Online Attacks Types of Data Breach and CyberAttack Prevention Methods
Phishing attacks are a common tactic used by cybercriminals to lure unsuspecting users into
providing their private information. The need to look for and develop methods of detecting …
providing their private information. The need to look for and develop methods of detecting …
A URL-based social semantic attacks detection with character-aware language model
Social engineering attacks rely on human errors and behavioral choices. The semantic
attack, a subcategory of social engineering attacks, utilizes behavioral or cosmetic deception …
attack, a subcategory of social engineering attacks, utilizes behavioral or cosmetic deception …