NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 282
11.
Full text
12.
  • A Comprehensive Survey for ... A Comprehensive Survey for Intelligent Spam Email Detection
    Karim, Asif; Azam, Sami; Shanmugam, Bharanidharan ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    The tremendously growing problem of phishing e-mail, also known as spam including spear phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e-mail filters. This ...
Full text

PDF
13.
  • ICSA: Intelligent chatbot s... ICSA: Intelligent chatbot security assistant using Text-CNN and multi-phase real-time defense against SNS phishing attacks
    Yoo, Jinsol; Cho, Youngho Expert systems with applications, 11/2022, Volume: 207
    Journal Article
    Peer reviewed

    •SNS phishing attack is one of social engineering attacks.•Formalized SNS phishing attack phases based on social engineering attack cycles.•Generated SNS phishing attack phase classifiers by using ...
Full text
14.
  • Towards detection of phishi... Towards detection of phishing websites on client-side using machine learning based approach
    Jain, Ankit Kumar; Gupta, B. B. Telecommunication systems, 08/2018, Volume: 68, Issue: 4
    Journal Article
    Peer reviewed

    The existing anti-phishing approaches use the blacklist methods or features based machine learning techniques. Blacklist methods fail to detect new phishing attacks and produce high false positive ...
Full text
15.
Full text
16.
  • A machine learning based ap... A machine learning based approach for phishing detection using hyperlinks information
    Jain, Ankit Kumar; Gupta, B. B. Journal of ambient intelligence and humanized computing, 1/5, Volume: 10, Issue: 5
    Journal Article
    Peer reviewed

    This paper presents a novel approach that can detect phishing attack by analysing the hyperlinks found in the HTML source code of the website. The proposed approach incorporates various new ...
Full text
17.
  • Simulated Phishing Attack a... Simulated Phishing Attack and Embedded Training Campaign
    Yeoh, William; Huang, He; Lee, Wang-Sheng ... The Journal of computer information systems, 07/2022, Volume: 62, Issue: 4
    Journal Article
    Peer reviewed

    Phishing attacks are costly for both organizations and individuals, yet existing academic research has provided little guidance on how to strategize and implement a combined phishing awareness and ...
Full text
18.
  • Double-Layer Detection of I... Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning
    He, Daojing; Lv, Xin; Xu, Xueqian ... IEEE transactions on information forensics and security, 2024, Volume: 19
    Journal Article
    Peer reviewed

    In recent years, phishing email-mediated attacks are proliferating. When victims are enterprise employees, internal security of the enterprise systems will also be threatened. Currently, blockchain ...
Full text
19.
Full text
20.
  • Detection of Phishing URLs ... Detection of Phishing URLs Using Temporal Convolutional Network
    Remmide, Mohamed Abdelkarim; Boumahdi, Fatima; Boustia, Narhimene ... Procedia computer science, 2022, 2022-00-00, Volume: 212
    Journal Article
    Peer reviewed
    Open access

    Throughout the past few years, phishing attacks have become an increasingly substantial problem for individuals and organizations. In this non-technical attack, the victim is deceived into accessing ...
Full text
1 2 3 4 5
hits: 282

Load filters