SY Yerima, MK Alzaylaee - 2020 3rd International Conference …, 2020 - ieeexplore.ieee.org
The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber …
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online …
AO Taofeek - ATBU Journal of Science, Technology and …, 2024 - researchgate.net
Agboola Olayinka Taofeek Stephen F. Austin State University, Nacogdoches, Texas, USA. ABSTRACT Protecting and preventing sensitive data from being used appropriately has …
In recent years, phishing attacks have become more intelligent and more challenging to detect using typical phishing methods. Moreover, attackers have leveraged some web …
Purpose Phishing attacks have evolved in recent years due to high-tech-enabled economic growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the …
A Aljofey, Q Jiang, Q Qu, M Huang, JP Niyigena - Electronics, 2020 - mdpi.com
Phishing is the easiest way to use cybercrime with the aim of enticing people to give accurate information such as account IDs, bank details, and passwords. This type of …
Phishing is a fraudulent practice and a form of cyber-attack designed and executed with the sole purpose of gathering sensitive information by masquerading the genuine websites …
A Zamir, HU Khan, T Iqbal, N Yousaf, F Aslam… - The Electronic …, 2020 - emerald.com
Purpose This paper aims to present a framework to detect phishing websites using stacking model. Phishing is a type of fraud to access users' credentials. The attackers access users' …
Y Wei, Y Sekiya - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing is a kind of worldwide spread cybercrime that uses disguised websites to trick users into downloading malware or providing personally sensitive information to attackers …