The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in …
SJ Bu, SB Cho - … 2021-2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
Considering the fatality of phishing attacks that are emphasized by many organizations, the inductive learning approach using reported malicious URLs has been verified in the field of …
In the dynamic realm of digital advancements, the persistent menace of phishing attacks continues to jeopardize the security landscape for both individuals and organizations. As …
A Mahesh, P Seshadri, S Mishra… - … and Applications of …, 2023 - Wiley Online Library
Phishing is a deceitful process by which an attacker tries to steal sensitive information from a naïve user. These types of attacks are generally carried out through emails, text messages …
On the Internet, every different day, kinds of attacks are deployed on innocent users. Among all, phishing is the most severe attack in which users lose their credentials or private …
To combat malicious domains, which serve as a key platform for a wide range of attacks, domain name service (DNS) data provide rich traces of Internet activities and are a powerful …
Considering the fatality of phishing attacks, the data-driven approach using massive URL observations has been verified, especially in the field of cyber security. On the other hand …
Phishing is constantly growing to be one of the most adopted tools for conducting cyber- attacks. Recent statistics indicated that 97% of users could not recognize a sophisticated …
Phishing is the starting point for many cyberattacks that threaten the confidentiality, availability and integrity of enterprises' and consumers' data. The URL of a web page that …