Phishing and spear phishing are typical examples of masquerade attacks since trust is built up through impersonation for the attack to succeed. Given the prevalence of these attacks …
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity. Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
H Le, Q Pham, D Sahoo, SCH Hoi - arXiv preprint arXiv:1802.03162, 2018 - arxiv.org
Malicious URLs host unsolicited content and are used to perpetrate cybercrimes. It is imperative to detect them in a timely manner. Traditionally, this is done through the usage of …
Social networks are very popular in today's world. Millions of people use various forms of social networks as they allow individuals to connect with friends and family, and share …
Over the last few years, online social networks (OSNs), such as Facebook, Twitter and Tuenti, have experienced exponential growth in both profile registrations and social …
In this paper, we propose a method of phishing website detection that utilizes a meta- heuristic-based nonlinear regression algorithm together with a feature selection approach …
The World Wide Web services are essential in our daily lives and are available to communities through Uniform Resource Locator (URL). Attackers utilize such means of …
Phishing is considered a great scourge in cyberspace. Presently, there are two major challenges known with the existing anti-phishing solutions. Low detection rate and lack of …
R Rawat, V Mahor, S Chirgaiya, AS Rathore - Advances in Cybersecurity …, 2021 - Springer
Social media networks have grown rapidly as a key platform for communicating and sharing information. Millions of users are actively accessing its features and making connections …