DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 294
1.
  • Phishing Attacks: A Recent ... Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
    Alkhalil, Zainab; Hewage, Chaminda; Nawaf, Liqaa ... Frontiers in computer science (Lausanne), 03/2021, Volume: 3
    Journal Article
    Peer reviewed
    Open access

    With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become ...
Full text
Available for: UL

PDF
2.
  • Machine learning based phis... Machine learning based phishing detection from URLs
    Sahingoz, Ozgur Koray; Buber, Ebubekir; Demir, Onder ... Expert systems with applications, 03/2019, Volume: 117
    Journal Article
    Peer reviewed

    •Use of 7 different classification algorithms and NLP based features.•A Big URL Data Set is produced and shared (36,400 legitimate and 37,175 phishing).•Real-time and language-independent ...
Full text
Available for: UL
3.
  • Machine Learning Based Phis... Machine Learning Based Phishing Attacks Detection Using Multiple Datasets
    Aljammal, Ashraf H.; Taamneh, Salah; Qawasmeh, Ahmad ... International journal of interactive mobile technologies, 03/2023, Volume: 17, Issue: 5
    Journal Article
    Peer reviewed

    Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so an accurate phishing detection system is required. Therefore, many phishing detection techniques have been ...
Full text
Available for: UL
4.
  • A survey of phishing attack... A survey of phishing attack techniques, defence mechanisms and open research challenges
    Jain, Ankit Kumar; Gupta, B.B. Enterprise information systems, 04/2022, Volume: 16, Issue: 4
    Journal Article
    Peer reviewed

    Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so on. Researchers have developed various ...
Full text
Available for: UL
5.
  • Enhancеd Analysis Approach ... Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis
    Jafar, Mousa Tayseer; Al-Fawa’reh, Mohammad; Barhoush, Malek ... Cybernetics and information technologies : CIT, 03/2022, Volume: 22, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Public health responses to the COVID-19 pandemic since March 2020 have led to lockdowns and social distancing in most countries around the world, with a shift from the traditional work environment to ...
Full text
Available for: UL
6.
  • A comprehensive survey of A... A comprehensive survey of AI-enabled phishing attacks detection techniques
    Basit, Abdul; Zafar, Maham; Liu, Xuan ... Telecommunication systems, 01/2021, Volume: 76, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) ...
Full text
Available for: CEKLJ, UL

PDF
7.
  • Mitigation of Phishing URL ... Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm
    Gopal S. B; Poongodi C KSII transactions on Internet and information systems, 07/2023, Volume: 17, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. ...
Full text
Available for: UL
8.
  • An Investigation of AI-Base... An Investigation of AI-Based Ensemble Methods for the Detection of Phishing Attacks
    Alsariera, Yazan A.; Alanazi, Meshari H.; Said, Yahia ... Engineering, technology & applied science research, 06/2024, Volume: 14, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Phishing attacks remain a significant cybersecurity threat in the digital landscape, leading to the development of defense mechanisms. This paper presents a thorough examination of Artificial ...
Full text
Available for: UL
9.
  • Detecting Phishing Website ... Detecting Phishing Website with Machine Learning
    Priya Darshini, Smt.V.; Srilatha, P.; Neelima, P. International journal of recent technology and engineering, 09/2019, Volume: 8, Issue: 3
    Journal Article
    Open access

    Attacks are many types to disturb the network or any other websites. Phishing attacks (PA) are a type of attacks which attack the website and damage the website and may lose the data. Many types of ...
Full text
Available for: UL

PDF
10.
  • Phishing Attacks Detection ... Phishing Attacks Detection by Using Artificial Neural Networks
    majeed jasim; Loay E. George Iraqi Journal for Computer Science and Mathematics, 8/2023, Volume: 4, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Today's world is heading towards complete digital transformation, and with all its advantages, this transformation involves many risks, the most important of which is phishing. This paper proposes a ...
Full text
Available for: UL
1 2 3 4 5
hits: 294

Load filters