L Tang, QH Mahmoud - Machine Learning and Knowledge Extraction, 2021 - mdpi.com
With the development of the Internet, network security has aroused people's attention. It can be said that a secure network environment is a basis for the rapid and sound development of …
A Almomani, M Alauthman, MT Shatnawi… - … Journal on Semantic …, 2022 - igi-global.com
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our …
SR Abdul Samad, S Balasubaramanian, AS Al-Kaabi… - Electronics, 2023 - mdpi.com
Phishing leverages people's tendency to share personal information online. Phishing attacks often begin with an email and can be used for a variety of purposes. The …
S Alnemari, M Alshammari - Applied Sciences, 2023 - mdpi.com
Phishing is an online threat where an attacker impersonates an authentic and trustworthy organization to obtain sensitive information from a victim. One example of such is trolling …
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to …
K Khandelwal, S Nanda, AK Dalai - Environmental Chemistry Letters, 2024 - Springer
The world energy consumption has increased by+ 195% since 1970 with more than 80% of the energy mix originating from fossil fuels, thus leading to pollution and global warming …
Phishing is one of the biggest crimes in the world and involves the theft of the user's sensitive data. Usually, phishing websites target individuals' websites, organizations, sites …
Phishing attacks are a common tactic used by cybercriminals to lure unsuspecting users into providing their private information. The need to look for and develop methods of detecting …
E Zhu, Z Chen, J Cui, H Zhong - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
To effectively boost computer usage, machine learning models are used in several phishing detection systems to classify enormous phishing datasets. Based on phishing patterns …