Showing 1 - 20 results of 25 for search '"Phish"', query time: 0.05s Refine Results
  1. 1

    Edge Colouring of Neutrosophic Graphs and Its Application in Detection of Phishing Website by Rupkumar Mahapatra, Sovan Samanta, Madhumangal Pal

    Published 2022-01-01
    “…Finally, a real-life application for detecting phishing websites has been demonstrated by NG colouring.…”
    Get full text
    Article
  2. 2
  3. 3

    A Deep Learning Filter that Blocks Phishing Campaigns Using Intelligent English Text Recognition Methods by Yonghui Tang, Fei Wu

    Published 2022-01-01
    “…Most of the sophisticated attacks in the modern age of cybercrime are based, among other things, on specialized phishing campaigns. A challenge in identifying phishing campaigns is defining a classification of patterns that can be generalized and used in different areas and campaigns of a different nature. …”
    Get full text
    Article
  4. 4
  5. 5

    Rede Neural Fuzzy Autoexpansível baseada na Teoria da Ressonância Adaptativa para detecção de sites de Phishing by Gustavo Henrique Santiago da Silva, Reginaldo José da Silva, Angela Leite Moreno

    Published 2023-10-01
    “…Phishing é um ataque cibernético baseado em fraude digital, cujo objetivo é o roubo de informações. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    A global dataset of freshwater fish trophic interactions by Jacob Ridgway, Jeff Wesner

    Published 2025-01-01
    “…Nonetheless, FishBase excludes a large portion of the ecological literature because it was developed before the creation of most modern scientific search engines. Our project, TroPhish, builds upon FishBase by digitizing over 100 years of data from the fish predation literature. …”
    Get full text
    Article
  12. 12

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    “…Through an in-depth analysis of recent research, we examine the security challenges associated with IoT-based cloud computing, including account hacking, phishing, malware, middleman attacks, and service denial. …”
    Get full text
    Article
  13. 13

    Identifying the Origin of Cyber Attacks Using Machine Learning and Network Traffic Analysis by Du Tianqing

    Published 2025-01-01
    “…While the development of the internet promotes global progress, it also brings various cyber-attacks, such as phishing, junk emails, and keylogging. To ensure a clean internet environment, it is essential to identify the origin of cyber-attacks for effective defense and mitigation. …”
    Get full text
    Article
  14. 14

    Secure OpenID Authentication Model by Using Trusted Computing by E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, M. S. Abdullah

    Published 2014-01-01
    “…This paper proposes a model in which One Time Password (OTP), TPM, and OpenID are used to provide a solution against phishing as a common identity theft in cloud environment.…”
    Get full text
    Article
  15. 15

    Fraud Detection in Cryptocurrency Networks—An Exploration Using Anomaly Detection and Heterogeneous Graph Transformers by Víctor Pérez-Cano, Francisco Jurado

    Published 2025-01-01
    “…One of these challenges is the fight against fraudulent activities performed in these networks, which, among other things, involve financial schemes, phishing attacks or money laundering. This article will address the problem of identifying fraud cases among a large set of transactions extracted from the Bitcoin network. …”
    Get full text
    Article
  16. 16

    Security and Privacy in Metaverse: A Comprehensive Survey by Yan Huang, Yi (Joy) Li, Zhipeng Cai

    Published 2023-06-01
    “…These characteristics not only carve the Metaverse into a novel and fantastic digital world, but also make it suffer from all security/privacy risks, such as personal information leakage, eavesdropping, unauthorized access, phishing, data injection, broken authentication, insecure design, and more. …”
    Get full text
    Article
  17. 17

    An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection by Umair Maqsood, Saif Ur Rehman, Tariq Ali, Khalid Mahmood, Tahani Alsaedi, Mahwish Kundi

    Published 2023-01-01
    “…The e-mails that pretend to be from a trusted company to provide “financial or personal information” are phishing e-mails. These e-mails contain some links; users might download malicious software on their computers when they click on them. …”
    Get full text
    Article
  18. 18

    Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection by William Villegas-Ch, Jaime Govea, Rommel Gutierrez, Aracely Mera-Navarrete

    Published 2025-01-01
    “…The simulations demonstrate that the proposed system improves the precision of detecting phishing attacks by up to 95.2%. At the same time, the authentication latency is reduced to 15 ms in networks with 1000 connected devices, 66.6% faster than traditional solutions. …”
    Get full text
    Article
  19. 19

    Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity by Mohd Imran Md Yusop, Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Mohammad Kamrul Hasan

    Published 2025-01-01
    “…As reliance on digital services grows, traditional password-based authentication methods have been increasingly scrutinized due to their susceptibility to cyber-attacks, including phishing and brute force attacks. This has led to a shift toward passwordless authentication, an approach that promises enhanced security and user experience. …”
    Get full text
    Article
  20. 20

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam, Moutaz Alazab, Albara Awajan, Nuruzzaman Faruqui

    Published 2025-01-01
    “…This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. …”
    Get full text
    Article