AK Jain, SR Sahoo, J Kaubiyal - Complex & Intelligent Systems, 2021 - Springer
With fast-growing technology, online social networks (OSNs) have exploded in popularity over the past few years. The pivotal reason behind this phenomenon happens to be the …
A Almomani, M Alauthman, MT Shatnawi… - … Journal on Semantic …, 2022 - igi-global.com
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our …
L Tang, QH Mahmoud - Machine Learning and Knowledge Extraction, 2021 - mdpi.com
With the development of the Internet, network security has aroused people's attention. It can be said that a secure network environment is a basis for the rapid and sound development of …
In the past few years, artificial intelligence (AI) techniques have been implemented in almost all verticals of human life. However, the results generated from the AI models often lag …
D Hillman, Y Harel, E Toch - Computers & Security, 2023 - Elsevier
Employees are often the victims of phishing attacks, posing a threat to both themselves and their organizations. In response, organizations are dedicating resources, time, and …
In today's email dependent world, cyber criminals often target organizations using a variety of social engineering techniques and specially crafted malicious emails. When successful …
Feature selection and hyper-parameters optimization (tuning) are two of the most important and challenging tasks in machine learning. To achieve satisfying performance, every …
Abstract Information technology is one of the most rapidly growing technologies globally. Over the last decade, its usage in healthcare has been remarkable. Over the last decade, its …
Phishing and social engineering contribute to various cyber incidents such as data breaches and ransomware attacks, financial frauds, and denial of service attacks. Often, phishers …