NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

24 25 26 27 28
hits: 282
251.
  • Phishing Detection using Random Forest, SVM and Neural Network with Backpropagation
    Sindhu, Smita; Patil, Sunil Parameshwar; Sreevalsan, Arya ... 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), 2020-Oct.-9
    Conference Proceeding

    Phishing is a common attack used to obtain sensitive information using visually similar websites to that of legitimate websites. With the growing technology, phishing attacks are on the rise. Machine ...
Full text
252.
  • Evaluation of Secure OpenID... Evaluation of Secure OpenID-Based RAAA User Authentication Protocol for Preventing Specific Web Attacks in Web Apps
    Bilal, Muhammad; Wang, Can; Yu, Zhi ... 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS), 2020-Oct.-16
    Conference Proceeding

    Identity management (IdM) plays a significant role in managing user identities (IDs). However, IdM is challenging to handle the rapidly rising numerous kinds of Web-based applications nowadays. The ...
Full text
253.
  • Analysis of Cyberattacks and its Detection Mechanisms
    Sudar, K.Muthamil; Deepalakshmi, P.; Nagaraj, P. ... 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2020-Nov.-26
    Conference Proceeding

    With the help of Internet, there are tremendous innovations and developments in technologies. Most of the business organizations are forced to use the flexible and modern network technologies for ...
Full text
254.
  • Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester
    Terneva, Zornitsa; Vladimirov, Ivaylo; Nikolova, Desislava 2021 56th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST), 2021-June-16
    Conference Proceeding

    In this scientific paper, a test is made on how reliable and secure databases are. The simulation shows how easily hackers can access a database and use its contents maliciously. It is performed on a ...
Full text
255.
  • Reconnaissance of Credentials through Phishing Attacks & it's Detection using Machine Learning
    Altamash, Mohd; Singh, Shailendra Narayan 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022-May-26, Volume: 1
    Conference Proceeding

    A cybercrime is what that best describes a Phishing Attack through which even a normal citizen of a country copies a true person/institution by encouraging them as an official person via e-mail or ...
Full text
256.
  • The Use of Subliminal and Supraliminal Messages in Phishing and Spear Phishing Based Social Engineering Attacks; Feasibility Study
    Deshan Ilangakoon, Sriendra; Abeywardena, K. Y. 2018 13th International Conference on Computer Science & Education (ICCSE), 2018-August
    Conference Proceeding

    This paper evaluates the background research to identify the possibility of using a new vector of social engineering attack using a psychological concept which thus far had been only used in ...
Full text
257.
  • Machine Learning Approach Based on Hybrid Features for Detection of Phishing URLs
    Ghimire, Awishkar; Kumar Jha, Avinash; Thapa, Surendrabikram ... 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2021-Jan.-28
    Conference Proceeding

    Phishing attacks are one of the most widespread problems over the internet. A lot of internet users fall into the hands of attackers every day which accounts into millions of dollars of fraud around ...
Full text
258.
  • Detection of Cyber Attacks: XSS, SQLI, Phishing Attacks and Detecting Intrusion Using Machine Learning Algorithms
    Bhardwaj, Aashutosh; Chandok, Saheb Singh; Bagnawar, Aniket ... 2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT), 2022-Sept.-23
    Conference Proceeding

    Cyber-crime is spreading throughout the world, exploiting any type of vulnerability in the cloud computing platform. Ethical hackers are primarily concerned in identifying flaws and recommending ...
Full text
259.
  • A literature survey on anti... A literature survey on anti-phishing in websites
    Zaimi, Rania; Hafidi, Mohamed; Lamia, Mahnane Proceedings of the 4th International Conference on Networking, Information Systems & Security, 04/2021
    Conference Proceeding

    Phishing and fraud sites have been widespread on the internet in recent times, which's become a source of great concern and a serious cybersecurity problem, as internet fraudsters target sensitive ...
Full text
260.
  • Studying user's computer security behaviour in developing an effective antiphishing educational framework
    Rakhra, Manik; Kaur, Davneet 2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018-Jan.
    Conference Proceeding

    In recent years, cybercrime has focused profoundly on people to bypass existing sophisticated security controls; phishing is one of the most common forms of such attacks. Phishing is an online ...
Full text
24 25 26 27 28
hits: 282

Load filters