Cosine and Soft Cosine Similarity-Based Anti-Phishing Model

B Sharma, P Singh, J Kaur - New Approaches for Multidimensional Signal …, 2021 - Springer
Phishing attack has posed a greater threat to user information over network. In addition to
the existence of various disguise illegal URL's, instances had been seen when users are …

An anti-phishing model based on similarity measurement

P Singh, B Sharma, J Kaur - International Journal of …, 2022 - inderscienceonline.com
Phishing has represented a more noteworthy danger to clients. In the current work, the
authors attempted to build up a powerful anti-phishing technique based on hybrid similarity …

Anti-phishing model based on relative content mining

P Singh, B Sharma - International Journal of Computational …, 2022 - inderscienceonline.com
Phishing has attracted larger section of researchers and application developers not due to
the rising instances of phishing attacks but also due to the sophisticated techniques that are …

[PDF][PDF] Antiphishing Model Based on Similarity Index and Neural Networks

B Sharma, DP Singh, DJ Kaur… - International Journal of …, 2019 - researchgate.net
Phishing is a negative technique that is used to steel private and confidential information
over the web. In the present work author proposed a hybrid similarity of Cosine and Soft …

IntAnti-Phish: An intelligent anti-phishing framework using backpropagation neural network

SSMM Rahman, L Gope, T Islam, M Alazab - Machine Intelligence and Big …, 2021 - Springer
Among the cybercriminals, the popularity of phishing has been rapidly growing day by day.
Therefore, phishing has become an alarming issue to solve in the field of cybersecurity …

Hybrid Rule‐Based Solution for Phishing URL Detection Using Convolutional Neural Network

Y Mourtaji, M Bouhorma, D Alghazzawi… - Wireless …, 2021 - Wiley Online Library
The phenomenon of phishing has now been a common threat, since many individuals and
webpages have been observed to be attacked by phishers. The common purpose of …

PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning

A Prasad, S Chandra - Computers & Security, 2024 - Elsevier
With the proliferation of the World Wide Web and the increasing sophistication of cyber
threats, phishing attacks have emerged as a significant concern for individuals and …

A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link

R Zaimi, M Hafidi, M Lamia - The Journal of Supercomputing, 2024 - Springer
In contemporary times, the proliferation of phishing attacks presents a substantial and
growing challenge to cybersecurity. This fraudulent tactic is designed to deceive …

A Permutaion Importance Based feature selection method and Deep Learning Model to Detect Phishing Websites

R Zaimi, M Hafidi, L Mahnane - 2024 - researchsquare.com
Phishing attacks pose a significant and escalating threat to cybersecurity in recent times.
This deceptive scam aims to trick naive users, luring them into visiting harmful websites and …

Phishing Detection by integrating Machine Learning and Deep Learning

S Sawant, R Savakhande, O Sankhe… - … on Computing for …, 2024 - ieeexplore.ieee.org
Nowadays, where individuals are constantly utilizing the internet, phishing attacks are a
threat to them. In such attacks, individuals' personal information, financial information, etc. is …