An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A …

T Ige, C Kiekintveld, A Piplai, A Waggler… - arXiv preprint arXiv …, 2024 - arxiv.org
Phishing is one of the most effective ways in which cybercriminals get sensitive details such
as credentials for online banking, digital wallets, state secrets, and many more from potential …

Anti-phishing: A comprehensive perspective

G Varshney, R Kumawat, V Varadharajan… - Expert Systems with …, 2024 - Elsevier
Phishing is a form of deception technique that attackers often use to acquire sensitive
information related to individuals and organizations fraudulently. Although Phishing attacks …

Cyber threat intelligence-based malicious URL detection model using ensemble learning

M Alsaedi, FA Ghaleb, F Saeed, J Ahmad, M Alasli - Sensors, 2022 - mdpi.com
Web applications have become ubiquitous for many business sectors due to their platform
independence and low operation cost. Billions of users are visiting these applications to …

An intelligent identification and classification system for malicious uniform resource locators (URLs)

Q Abu Al-Haija, M Al-Fayoumi - Neural Computing and Applications, 2023 - Springer
Abstract Uniform Resource Locator (URL) is a unique identifier composed of protocol and
domain name used to locate and retrieve a resource on the Internet. Like any Internet …

Multimodel phishing url detection using lstm, bidirectional lstm, and gru models

SS Roy, AI Awad, LA Amare, MT Erkihun, M Anas - Future Internet, 2022 - mdpi.com
In today's world, phishing attacks are gradually increasing, resulting in individuals losing
valuables, assets, personal information, etc., to unauthorized parties. In phishing, attackers …

CCrFS: combine correlation features selection for detecting phishing websites using machine learning

J Moedjahedy, A Setyanto, FK Alarfaj, M Alreshoodi - Future Internet, 2022 - mdpi.com
Internet users are continually exposed to phishing as cybercrime in the 21st century. The
objective of phishing is to obtain sensitive information by deceiving a target and using the …

A large-scale pretrained deep model for phishing url detection

Y Wang, W Zhu, H Xu, Z Qin, K Ren… - ICASSP 2023-2023 …, 2023 - ieeexplore.ieee.org
Phishing attacks have always been a security issue that has attracted great attention in the
cyber security community. Recently, the famous pre-trained models is being used as an anti …

Classifying swahili smishing attacks for mobile money users: A machine-learning approach

IS Mambina, JD Ndibwile, KF Michael - IEEE Access, 2022 - ieeexplore.ieee.org
Due to the massive adoption of mobile money in Sub-Saharan countries, the global
transaction value of mobile money exceeded 2 billion in 2021. Projections show transaction …

[PDF][PDF] Online Attacks Types of Data Breach and CyberAttack Prevention Methods

MA Baballe, A Hussaini, MI Bello… - Current Trends in …, 2022 - academia.edu
Phishing attacks are a common tactic used by cybercriminals to lure unsuspecting users into
providing their private information. The need to look for and develop methods of detecting …

A URL-based social semantic attacks detection with character-aware language model

M Almousa, M Anwar - IEEE Access, 2023 - ieeexplore.ieee.org
Social engineering attacks rely on human errors and behavioral choices. The semantic
attack, a subcategory of social engineering attacks, utilizes behavioral or cosmetic deception …