Showing 21 - 25 results of 25 for search '"Phish"', query time: 0.03s Refine Results
  1. 21

    An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks by Selvam Saravanan, Uma Maheswari Balasubramanian

    Published 2024-06-01
    “…Attackers use IoT devices to create botnets and launch attacks, such as DDoS, Spamming, Cryptocurrency mining, Phishing, etc. The service providers of large-scale IoT networks need to set up a data pipeline to collect the vast network traffic data from the IoT devices, store it, analyze it, and report the malicious IoT devices and types of attacks. …”
    Get full text
    Article
  2. 22

    New Heuristics Method for Malicious URLs Detection Using Machine Learning by Maher Kassem Hasan

    Published 2024-09-01
    “… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
    Get full text
    Article
  3. 23

    Pengukuran Kesadaran Keamanan Informasi Pegawai: Studi Kasus PT Meshindo Jayatama by Abdul Gofur, Rizal Fathoni Aji, Heri Kurniawan

    Published 2024-08-01
    “…Hasil wawancara dengan Presiden Direktur dan Manager Teknologi Informasi (TI) PT Meshindo Jayatama menyatakan bahwa telah terjadi serangan seperti Phishing dan Malware sebanyak 26 kali ditahun 2023. …”
    Get full text
    Article
  4. 24

    Unveiling personalized and gamification-based cybersecurity risks within financial institutions by Amna Shahzadi, Kashif Ishaq, Naeem A. Nawaz, Fadhilah Rosdi, Fawad Ali Khan

    Published 2025-02-01
    “…The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (e.g., phishing, malware, APTs) and non-game-based (e.g., social engineering, compliance issues) threats. …”
    Get full text
    Article
  5. 25

    Cyber security laws and safety in e-commerce in India by A. K. Kashyap, M. Chaudhary

    Published 2023-06-01
    “…The Indian Penal Code addresses unauthorized access, hacking, identity theft, phishing, and computer virus dissemination. The Reserve Bank of India oversees online payment and financial security, mandating two-factor authentication, encryption, and secure payment channels. …”
    Get full text
    Article