A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

B Biswas, A Mukhopadhyay, S Bhattacharjee… - Decision Support …, 2022 - Elsevier
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals
where they engage in technical discussions, share exploits and relevant hacking tools to be …

Phishing and intrusion attacks: An overview of classification mechanisms

S Tareen, SU Bazai, S Ullah, R Ullah… - 2022 3rd …, 2022 - ieeexplore.ieee.org
The digital world is becoming increasingly interconnected and cyberattacks such as
phishing are becoming more common. Fraudulent emails and bogus websites are used to …

Application of word embedding and machine learning in detecting phishing websites

RS Rao, A Umarekar, AR Pais - Telecommunication Systems, 2022 - Springer
Phishing is an attack whose aim is to gain personal information such as passwords, credit
card details etc. from online users by deceiving them through fake websites, emails or any …

[HTML][HTML] A novel logo identification technique for logo-based phishing detection in cyber-physical systems

P Panda, AK Mishra, D Puthal - Future Internet, 2022 - mdpi.com
The first and foremost task of a phishing-detection mechanism is to confirm the appearance
of a suspicious page that is similar to a genuine site. Once this is found, a suitable URL …

Creating guidelines and best practices against phishing and ransomware attacks for healthcare personnel

K Perova - 2022 - lutpub.lut.fi
Amidst the digitalization of services across all sectors, it is essential to stay up to date with
the protection mechanisms to be able to protect the systems and services against a …

Identification of pharming in communication networks using ensemble learning

NA Azeez, SS Oladele, O Ologe - Nigerian Journal of Technological …, 2022 - ajol.info
Pharming scams are carried out by exploiting the DNS as the main weapon while phishing
attacks employ spoofed websites that appear to be legitimate to internet users. Phishing …

Phishing URL Detection Using Machine Learning: A Survey

T Shrivastava, S Bhatt, NR Roy… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Phishing is a kind of social engineering attack with the intention to lure the victim to give up
their personal data such as financial information to the attackers through malicious websites …

A Fast Matching Method of Trusted Whitelist Based on Bloom Filter

W Shuai, H Aiqun, C Changbo… - 2022 7th International …, 2022 - ieeexplore.ieee.org
In the process of whitelist checking in the operating system kernel, the main problem is how
to put the relatively large amount of whitelist data information into the relatively limited kernel …

Masquerading Email Detection

R Saurabh, SB Bhasme, MS Saeed… - 2022 VIII …, 2022 - ieeexplore.ieee.org
The email which contains suspicious links or malicious files is one of the considerable
threats in the digital world nowadays and because of these types of emails, enormous social …

Securing Web Applications: Security Threats and Countermeasures

BM Arifuzzaman, SMN Mahmud, A Muniat… - … Approaches to Web …, 2022 - igi-global.com
Web-based services are common targets for hackers, and the need for ensuring their
security keeps on rising. Attackers often take advantage of the vulnerabilities of different web …