The rapid development of e-commerce, e-banking, and social networks has made phishing attack detection one of the most critical technologies in all cyber security systems. To …
W Ali - International Journal of Advanced Computer Science …, 2017 - researchgate.net
The problem of Web phishing attacks has grown considerably in recent years and phishing is considered as one of the most dangerous Web crimes, which may cause tremendous and …
TK Hua, A Macgregor - Authorea Preprints, 2022 - essopenarchive.org
An efficient phishing website detection plugin service was developed using machine learning technique based on the prevalent phishing threat while using existing web …
L Tang, QH Mahmoud - Machine Learning and Knowledge Extraction, 2021 - mdpi.com
With the development of the Internet, network security has aroused people's attention. It can be said that a secure network environment is a basis for the rapid and sound development of …
F Feng, Q Zhou, Z Shen, X Yang, L Han… - Journal of Ambient …, 2024 - Springer
In recent years, security incidents of website occur increasingly frequently, and this motivates us to study websites' security. Although there are many phishing detection …
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to …
A Safi, S Singh - Journal of King Saud University-Computer and …, 2023 - Elsevier
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain sensitive information from an internet user. In this Systematic Literature Survey (SLR) …
G Harinahalli Lokesh, G BoreGowda - Journal of Cyber Security …, 2021 - Taylor & Francis
Phishing a form of cyber-attack, which has an adverse effect on people where the user is directed to fake websites and duped to reveal their sensitive and personal information which …
A Alswailem, B Alabdullah, N Alrumayh… - … & Information Security …, 2019 - ieeexplore.ieee.org
Phishing website is one of the internet security problems that target the human vulnerabilities rather than software vulnerabilities. It can be described as the process of …