Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online …
Phishing is the technique by which the attacker tries to obtain confidential information from the user, with the purpose of using it fraudulently. These days, three ways to mitigate such …
Phishing detection with high-performance accuracy and low computational complexity has always been a topic of great interest. New technologies have been developed to improve …
M Hussain, C Cheng, R Xu, M Afzal - Information Sciences, 2023 - Elsevier
Phishing scams are increasing as the technical skills and costs of phishing attacks diminish, emphasizing the need for rapid, precise, and low-cost prevention measures. Based on a …
BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global Internet security. Today, phishing attack is one of the most common and serious threats over …
M Aljabri, S Mirza - 2022 7th International Conference on Data …, 2022 - ieeexplore.ieee.org
Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing …
SY Yerima, MK Alzaylaee - 2020 3rd International Conference …, 2020 - ieeexplore.ieee.org
The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber …
Recently, phishing attacks have become one of the most prominent social engineering attacks faced by public internet users, governments, and businesses. In response to this …
Purpose Phishing attacks have evolved in recent years due to high-tech-enabled economic growth worldwide. The rise in all types of fraud loss in 2019 has been attributed to the …