Phishing is a form of deception technique that attackers often use to acquire sensitive information related to individuals and organizations fraudulently. Although Phishing attacks …
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence …
M Wang, L Song, L Li, Y Zhu, J Li - Expert Systems with Applications, 2024 - Elsevier
In recent years, phishing websites have constantly evolved, causing traditional URL or HTML-based detection methods less effective. This limitation motivated the development of …
C Zonyfar, JB Lee, JD Kim - Journal of Web Engineering, 2023 - ieeexplore.ieee.org
Phishing techniques are the most frequently used threat by attackers to deceive Internet users and obtain sensitive victim information, such as login credentials and credit card …
MA Elberri, Ü Tokeşer, J Rahebi… - International Journal of …, 2024 - Springer
Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques, particularly convolutional neural …
H Bouijij, A Berqia - Journal of Telecommunications and the …, 2024 - search.informit.org
The Internet of Things (IoT) has proven its utility across various domains, including healthcare, agriculture, industry, and finance. It comprises Internet-connected devices that …
B Wang, F Shi, H Zheng - Applied Sciences, 2023 - mdpi.com
With the development of internet technology, the number of illicit websites such as gambling and pornography has dramatically increased, posing serious threats to people's physical …
L Sawe, J Gikandi, J Kamau… - Journal of Cybersecurity …, 2024 - researchgate.net
Phishing emails have experienced a rapid surge in cyber threats globally, especially following the emergence of the COVID-19 pandemic. This form of attack has led to …
Z Hu, Z Yuan - 2023 7th Asian Conference on Artificial …, 2023 - ieeexplore.ieee.org
The detection of malicious websites has become a critical issue in cybersecurity. Therefore, this paper offers a comprehensive review of data-driven methods for detecting malicious …