S Atawneh, H Aljehani - Electronics, 2023 - mdpi.com
Email phishing is a widespread cyber threat that can result in the theft of sensitive information and financial loss. It uses malicious emails to trick recipients into providing …
Protecting against interference is essential at a time when wireless communications are essential for sending large amounts of data. Our research presents a novel deep learning …
M Nanda, S Goel - Multimedia Tools and Applications, 2024 - Springer
Phishing is an attack that attempts to replicate the official websites of businesses, including government agencies, financial institutions, e-commerce platforms, and banks. These …
To secure computers and information systems from attackers taking advantage of vulnerabilities in the system to commit cybercrime, several methods have been proposed for …
The criticality of sustainable development to control the unprecedented consequences of climate change is clear. A vital element in launching sustainability projects is financing …
BK Sedraoui, A Benmachiche… - … on Pattern Analysis …, 2024 - ieeexplore.ieee.org
As technology continues to grow and becomes increasingly integral to education, institutions and universities worldwide are making substantial investments in e-learning platforms to …
Nowadays, phishing attacks are considered as one of the most common cyber-attacks which generally harm the security of various internet and communication systems. The phishing …
MA Tamal, MK Islam, T Bhuiyan, A Sattar… - Frontiers in Computer …, 2024 - frontiersin.org
Introduction The dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In …
Abstract Website Uniform Resource Locator (URL) spoofing remains one of the ways of perpetrating phishing attacks in the twenty-first century. Hackers continue to employ URL …