Articles with "phishing attacks" as a keyword



Photo from wikipedia

A survey of phishing attack techniques, defence mechanisms and open research challenges

Sign Up to like & get
recommendations!
Published in 2021 at "Enterprise Information Systems"

DOI: 10.1080/17517575.2021.1896786

Abstract: ABSTRACT Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so on. Researchers have developed various anti-phishing methods in recent years. However, the… read more here.

Keywords: survey; survey phishing; phishing attack; phishing attacks ... See more keywords
Photo by alterego_swiss from unsplash

A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3237798

Abstract: Phishing attacks are a type of cybercrime that has grown in recent years. It is part of social engineering attacks where an attacker deceives users by sending fake messages using social media platforms or emails.… read more here.

Keywords: information; url phishing; html url; survey ... See more keywords
Photo from wikipedia

Phishing Detection System Through Hybrid Machine Learning Based on URL

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3252366

Abstract: Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has become the most severe and dangerous cybercrime on… read more here.

Keywords: machine; machine learning; system hybrid; detection system ... See more keywords
Photo by faturnurf from unsplash

Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2018.2831197

Abstract: Phishing detection is recognized as a criminal issue of Internet security. By deploying a gateway anti-phishing in the networks, these current hardware-based approaches provide an additional layer of defense against phishing attacks. However, such hardware… read more here.

Keywords: neuro fuzzy; phishing attacks; fog networks; anti phishing ... See more keywords
Photo from wikipedia

Identifying phishing attacks in communication networks using URL consistency features

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Electronic Security and Digital Forensics"

DOI: 10.1504/ijesdf.2020.10027595

Abstract: Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing… read more here.

Keywords: attacks communication; phishing attacks; consistency; networks using ... See more keywords
Photo by campaign_creators from unsplash

Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14030082

Abstract: Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited. Despite ongoing… read more here.

Keywords: dynamics enhance; investigation using; keystroke dynamics; using captcha ... See more keywords