[PDF][PDF] A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

RRN Al Ogaili, S Manickam - Wasit Journal for Pure sciences, 2023 - iasj.net
People are increasingly sharing their personal information online as internet usage grows.
As a result, fraudsters have access to a massive amount of personal information and …

Phishing URL Detection Using Machine Learning: A Survey

T Shrivastava, S Bhatt, NR Roy… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Phishing is a kind of social engineering attack with the intention to lure the victim to give up
their personal data such as financial information to the attackers through malicious websites …

Cyber Threats in Agriculture and the Food Industry: An Indian Perspective

HC Verma, S Srivastava, T Ahmed… - Advances in Cyberology …, 2023 - igi-global.com
A cyber threat is a harmful act meant to steal, corrupt, or undermine an organization's digital
stability. At present cyber threats in agriculture and food industry is a rising concern because …

[PDF][PDF] AgriSecure: A Fog Computing-Based Security Framework for Agriculture 4.0 via Blockchain. Processes 2023, 11, 757

S Padhy, M Alowaidi, S Dash, M Alshehri, PP Malla… - 2023 - academia.edu
Every aspect of the 21st century has undergone a revolution because of the Internet of
Things (IoT) and smart computing technologies. These technologies are applied in many …

A Novel Approach of Detecting Malicious Phishing URL Using Self-organizing Map

MN Sakib, KH Robin, A Siddika, S Nahar - International Symposium on …, 2023 - Springer
Empirical study attempts to analyze major trends of phishing Uniform Resource Locator
detection, emphasized on improvement of 80% training data on feature extraction using term …

Detection of the cyber network attack using robust random forest in a big data environment

SS Ahmad, R Rani, EA Ali, I Wattar - AIP Conference Proceedings, 2023 - pubs.aip.org
Our civilization has entered an era of" knowledge revolution" due to the fast advancement
and widespread use of IT and the Internet. Moreover, as network traffic grows and becomes …

[PDF][PDF] Simplified review on cyber security threats detection in IoT environment using deep learning approach

AT Salim, BM Khammas - Journal of the College of Basic Education, 2023 - iasj.net
Wearable technology, sensor networks, and home utilities are just a few of the businesses
where the Internet of Things (IoT) is spreading quickly. With the development of the IoT …

فاعلية توظيف إستراتيجية نقاط التصويت في تحصيل مادة قواعد اللغة العربية عند تلاميذ الصف السادس الابتدائي

HH Baris - Journal of the College of Basic Education, 2023 - cbej.uomustansiriyah.edu.iq
The research aims to know (the effect of the voting points strategy on the achievement of
Arabic grammar for sixth graders of primary school), and the researcher chose his research …

Phishing Attack Mitigation Using Convolutional Neural Networks

D Guruprasad, R Subramanian… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Phishing has acquired immense consideration from both scholarly world and industry. The
variety of assault examples and mediums related with phishing made the advancement of …

[PDF][PDF] Phishing Malware Detection Using Machine Learning (WEKA)

MAEB Mail, MB Ab Rahman… - Proceedings: Liga Ilmu …, 2022 - ojs.politeknikjambi.ac.id
With the advancement of the Internet, a growing number of apps are being integrated into
websites that may be accessed directly over the network. This breakthrough has attracted an …