-
1
Edge Colouring of Neutrosophic Graphs and Its Application in Detection of Phishing Website
Published 2022-01-01“…Finally, a real-life application for detecting phishing websites has been demonstrated by NG colouring.…”
Get full text
Article -
2
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
3
A Deep Learning Filter that Blocks Phishing Campaigns Using Intelligent English Text Recognition Methods
Published 2022-01-01“…Most of the sophisticated attacks in the modern age of cybercrime are based, among other things, on specialized phishing campaigns. A challenge in identifying phishing campaigns is defining a classification of patterns that can be generalized and used in different areas and campaigns of a different nature. …”
Get full text
Article -
4
-
5
Rede Neural Fuzzy Autoexpansível baseada na Teoria da Ressonância Adaptativa para detecção de sites de Phishing
Published 2023-10-01“…Phishing é um ataque cibernético baseado em fraude digital, cujo objetivo é o roubo de informações. …”
Get full text
Article -
6
<span style="font-variant: small-caps">Ventinel</span>: Automated Detection of Android Vishing Apps Using Optical Character Recognition
Published 2025-01-01Subjects: Get full text
Article -
7
Filipino attitude and perception on Subscriber Identity Module (SIM) Card Registration Act
Published 2024-12-01Subjects: Get full text
Article -
8
AKADEMİK YAŞANTIDA SANAL TEHDİTLER VE VAKALAR ÜZERİNE BİR ANALİZ - AN ANALYSIS THROUGH CASES AND CYBER THREATS IN ACADEMIC LIFE
Published 2018-06-01Subjects: Get full text
Article -
9
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01Subjects: Get full text
Article -
10
Fraud in a digital society in the context of social change
Published 2023-04-01Subjects: Get full text
Article -
11
A global dataset of freshwater fish trophic interactions
Published 2025-01-01“…Nonetheless, FishBase excludes a large portion of the ecological literature because it was developed before the creation of most modern scientific search engines. Our project, TroPhish, builds upon FishBase by digitizing over 100 years of data from the fish predation literature. …”
Get full text
Article -
12
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01“…Through an in-depth analysis of recent research, we examine the security challenges associated with IoT-based cloud computing, including account hacking, phishing, malware, middleman attacks, and service denial. …”
Get full text
Article -
13
Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis
Published 2025-01-01“…While the development of the internet promotes global progress, it also brings various cyber-attacks, such as phishing, junk emails, and keylogging. To ensure a clean internet environment, it is essential to identify the origin of cyber-attacks for effective defense and mitigation. …”
Get full text
Article -
14
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…This paper proposes a model in which One Time Password (OTP), TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.…”
Get full text
Article -
15
Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers
Published 2025-01-01“…One of these challenges is the fight against fraudulent activities performed in these networks, which, among other things, involve financial schemes, phishing attacks or money laundering. This article will address the problem of identifying fraud cases among a large set of transactions extracted from the Bitcoin network. …”
Get full text
Article -
16
Security and Privacy in Metaverse: A Comprehensive Survey
Published 2023-06-01“…These characteristics not only carve the Metaverse into a novel and fantastic digital world, but also make it suffer from all security/privacy risks, such as personal information leakage, eavesdropping, unauthorized access, phishing, data injection, broken authentication, insecure design, and more. …”
Get full text
Article -
17
An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection
Published 2023-01-01“…The e-mails that pretend to be from a trusted company to provide “financial or personal information” are phishing e-mails. These e-mails contain some links; users might download malicious software on their computers when they click on them. …”
Get full text
Article -
18
Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection
Published 2025-01-01“…The simulations demonstrate that the proposed system improves the precision of detecting phishing attacks by up to 95.2%. At the same time, the authentication latency is reduced to 15 ms in networks with 1000 connected devices, 66.6% faster than traditional solutions. …”
Get full text
Article -
19
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01“…As reliance on digital services grows, traditional password-based authentication methods have been increasingly scrutinized due to their susceptibility to cyber-attacks, including phishing and brute force attacks. This has led to a shift toward passwordless authentication, an approach that promises enhanced security and user experience. …”
Get full text
Article -
20
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01“…This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. …”
Get full text
Article