Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

S Smadi, N Aslam, L Zhang - Decision Support Systems, 2018 - Elsevier
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …

[Retracted] Secure Complex Systems: A Dynamic Model in the Synchronization

AA Hamad, ML Thivagar, J Alshudukhi… - Computational …, 2021 - Wiley Online Library
Chaotic systems are one of the most significant systems of the technological period because
their qualities must be updated on a regular basis in order for the speed of security and …

[PDF][PDF] Detecting phishing attacks using a combined model of LSTM and CNN

S Ariyadasa, S Fernando, S Fernando - Int. J. Adv. Appl. Sci, 2020 - researchgate.net
Phishing, a social engineering crime which has been existing for more than two decades,
has gained significant research attention to find better solutions to face against the very …

Webpage retrieval based on query by example for think tank construction

Q Geng, Z Chuai, J Jin - Information Processing & Management, 2022 - Elsevier
Think tanks have been proved helpful for decision-making in various communities. However,
collecting information manually for think tank construction implies too much time and labor …

Fog Computing and Its security issues

JM Chatterjee, I Priyadarshini… - Security Designs for …, 2019 - Wiley Online Library
Fog computing is architecture that expands the cloud framework by providing computing
utilities on the edges of a system. It very well may be portrayed as a cloud-like architecture …

Generative adverserial analysis of phishing attacks on static and dynamic content of webpages

A O'Mara, I Alsmadi, A AlEroud - … IEEE Intl Conf on Parallel & …, 2021 - ieeexplore.ieee.org
In this paper, we studied the phishing problem from data analytics and AI-powered
adversarial attacks perspectives. We evaluated several static and dynamic features that can …

Search Engine Evaluation Methodology

JN Singh, P Johri, G Dhuriya… - … and Future Directions, 2023 - Wiley Online Library
In this chapter, we explore the various methodologies and statistical measures that have
been used for better evaluation of search engines. It also includes a comparative study of …

Combating the Phishing Attacks: Recent Trends and Future Challenges

S Tasmin, AK Sarmin, M Shalehin… - … Practical Approaches to …, 2022 - igi-global.com
The phishing attack targets the client's email and any other connection medium to illicitly get
the user credentials of e-commerce websites, educational websites, banks, credit card …

[图书][B] Social engineering and enterprise security: An exploratory qualitative case study

TJ Jackson - 2017 - search.proquest.com
The focus of this qualitative exploratory case study was to explore present control methods
and solutions used throughout technology-based, healthcare-based, and manufacturing …