Business email compromise phishing detection based on machine learning: a systematic literature review

HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …

Recent Advancements in Machine Learning for Cybercrime Prediction

L Elluri, V Mandalapu, P Vyas, N Roy - Journal of Computer …, 2023 - Taylor & Francis
Cybercrime is a growing threat to organizations and individuals worldwide, with criminals
using sophisticated techniques to breach security systems and steal sensitive data. This …

Analysis of different dimensionality reduction techniques and machine learning algorithms for an intrusion detection system

TN Varunram, MB Shivaprasad… - 2021 IEEE 6th …, 2021 - ieeexplore.ieee.org
Intrusion Detection Systems are of paramount importance in the present-day network
security environment. By analyzing and predicting the behavior of incoming data, IDS helps …

CNN based image forgery segmentation and classification for forensic verification

B Hemalatha, B Karthik, S Balaji… - … Conference on Electrical …, 2022 - Springer
The growth of digital images has improved because of the advent of a new camera and
smart devices. The social networking websites like Facebook, Instagram, and Twitter have …

Phishing website detection using machine learning: Model development and django integration

SM Sunday - Journal of Electrical Engineering, Electronics, Control …, 2023 - jeeeccs.net
The increasing number of phishing attacks is one of the major concerns of security
researchers today. Traditional solutions for spotting phishing websites rely on signature …

Social Engineering Attacks Detection Approach

S Lysenko, V Vorobiov, O Bokhonko… - 2023 13th …, 2023 - ieeexplore.ieee.org
The paper focuses on the problem of technical social engineering attacks that encompass
the manipulation of individuals to reveal sensitive information, execute actions, or breach …

Studies on Steganography Images and Videos Using Deep Learning Techniques

PS Kumar, K Fathima, B Karthik, SS Kumar… - … Conference on Electrical …, 2022 - Springer
Securing information has been very anxious regarding the advancement of data science,
technology as well as research fields. To resolve the security issues, information hiding …

Web Extension for Phishing URL Identification

KW WR, KK WR, KR Reddy… - 2022 Third …, 2022 - ieeexplore.ieee.org
Phishing attacks have been the most consistent and emerging cyber-attack among other
social engineering attacks. In spite of several strict mechanisms and policies to identify and …

Explainable Machine Learning for Drug Classification

K Mridha, SD Bappon, SM Sabuj, T Sarker… - … Conference on Electrical …, 2023 - Springer
This article provides a machine learning-based drug categorization research effort. The
public repository Kaggle is where the dataset for this study was obtained. Age, sex, blood …

Exploring Techniques for Web Phishing Detection: A Comprehensive Survey

SS Kumar, B Swarnagowri, R Susmitha… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Phishing is a common social engineering attack in today's world. By stealing confidential
data through various manipulation techniques, it has interfered with people's lives and had …