NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 258
1.
  • Phishing Attacks: A Recent ... Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
    Alkhalil, Zainab; Hewage, Chaminda; Nawaf, Liqaa ... Frontiers in computer science (Lausanne), 03/2021, Volume: 3
    Journal Article
    Peer reviewed
    Open access

    With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become ...
Full text

PDF
2.
  • Machine learning based phis... Machine learning based phishing detection from URLs
    Sahingoz, Ozgur Koray; Buber, Ebubekir; Demir, Onder ... Expert systems with applications, 03/2019, Volume: 117
    Journal Article
    Peer reviewed

    •Use of 7 different classification algorithms and NLP based features.•A Big URL Data Set is produced and shared (36,400 legitimate and 37,175 phishing).•Real-time and language-independent ...
Full text
3.
  • Machine Learning Based Phis... Machine Learning Based Phishing Attacks Detection Using Multiple Datasets
    Aljammal, Ashraf H.; Taamneh, Salah; Qawasmeh, Ahmad ... International journal of interactive mobile technologies, 03/2023, Volume: 17, Issue: 5
    Journal Article
    Peer reviewed

    Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so an accurate phishing detection system is required. Therefore, many phishing detection techniques have been ...
Full text
4.
  • A survey of phishing attack... A survey of phishing attack techniques, defence mechanisms and open research challenges
    Jain, Ankit Kumar; Gupta, B.B. Enterprise information systems, 04/2022, Volume: 16, Issue: 4
    Journal Article
    Peer reviewed

    Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so on. Researchers have developed various ...
Full text
5.
  • Enhancеd Analysis Approach ... Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis
    Jafar, Mousa Tayseer; Al-Fawa’reh, Mohammad; Barhoush, Malek ... Cybernetics and information technologies : CIT, 03/2022, Volume: 22, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Public health responses to the COVID-19 pandemic since March 2020 have led to lockdowns and social distancing in most countries around the world, with a shift from the traditional work environment to ...
Full text
6.
  • A comprehensive survey of A... A comprehensive survey of AI-enabled phishing attacks detection techniques
    Basit, Abdul; Zafar, Maham; Liu, Xuan ... Telecommunication systems, 01/2021, Volume: 76, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) ...
Full text

PDF
7.
  • An Investigation of AI-Base... An Investigation of AI-Based Ensemble Methods for the Detection of Phishing Attacks
    Yazan A. Alsariera; Meshari H. Alanazi; Yahia Said ... Engineering, technology & applied science research, 06/2024, Volume: 14, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Phishing attacks remain a significant cybersecurity threat in the digital landscape, leading to the development of defense mechanisms. This paper presents a thorough examination of Artificial ...
Full text
8.
  • Detecting Phishing Website ... Detecting Phishing Website with Machine Learning
    Priya Darshini, Smt.V.; Srilatha, P.; Neelima, P. International journal of recent technology and engineering, 09/2019, Volume: 8, Issue: 3
    Journal Article
    Open access

    Attacks are many types to disturb the network or any other websites. Phishing attacks (PA) are a type of attacks which attack the website and damage the website and may lose the data. Many types of ...
Full text

PDF
9.
  • Phishing Attacks Detection ... Phishing Attacks Detection by Using Artificial Neural Networks
    majeed jasim; Loay E. George Iraqi Journal for Computer Science and Mathematics, 8/2023, Volume: 4, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Today's world is heading towards complete digital transformation, and with all its advantages, this transformation involves many risks, the most important of which is phishing. This paper proposes a ...
Full text
10.
  • A Compendium on Risk Assess... A Compendium on Risk Assessment of Phishing Attack Using Attack Modeling Techniques
    Lohiya, Ritika; Thakkar, Ankit Procedia computer science, 2024, Volume: 235
    Journal Article
    Peer reviewed
    Open access

    With the advent of new attacking methodologies and types of attacks, it has become difficult to protect the systems. Therefore, it is necessary to decipher the impact of attacks before and after its ...
Full text
1 2 3 4 5
hits: 258

Load filters