Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

S Ahmad, M Zaman, AS AL-Shamayleh… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Advancement of the Internet has increased security risks associated with data protection and
online shopping. Several techniques compromise Internet security, including hacking, SQL …

Intelligent Methods in Phishing Website Detection: A Systematic Literature Review

Y Sattari, GA Montazer - 2023 - researchsquare.com
Abstract" Phishing" is a well-known cyberattack in which Internet users are targeted and
directed to a fake website, similar to a legitimate and valid one. In such attacks, users are …

Automated plant leaf disease classification using artificial algae algorithm with deep learning model

D Raja, M Karthikeyan - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Agriculture is the primary occupation in India and owing to plant diseases, annually it loses
35% of its crops. Early detection of plant disease is a challenging task due to its expert …

Multi-Level Resource-Coherented Graph Learning For Website Fingerprinting Attacks

B Gao, W Liu, G Liu, F Nie… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep learning-based website fingerprinting (WF) attacks dominate website traffic
classification. In the real world, the main challenges limiting their effectiveness are, on the …

[HTML][HTML] Comparative Analysis of Nature-Inspired Metaheuristic Techniques for Optimizing Phishing Website Detection

T Nagunwa - Analytics, 2024 - mdpi.com
The increasing number, frequency, and sophistication of phishing website-based attacks
necessitate the development of robust solutions for detecting phishing websites to enhance …

Unveiling the Efficacy of AI-based Algorithms in Phishing Attack Detection

T Shahzad, K Aman - Journal of Informatics and Web Engineering, 2024 - mmupress.com
Phishing poses a significant challenge in an ever-evolving world. The increased usage of
the Internet has resulted in the emergence of a different kind of theft referred to as …

PRAY So You Don't Become Prey

E Sivakumar, KJ Singh, P Chawla, X Cheng - SN Computer Science, 2024 - Springer
Cloned journals refer to deceptive or counterfeit scientific journals that imitate genuine
scholarly publications with the intention of misleading scholars into submitting their works …

Evaluating Deep Learning Models for Website Phishing Attack Detection: A Comparative Analysis

AR Egigogo, I Idris, M Olalere, AO Aderiike - Ceddi Journal of Information …, 2024 - ceddi.id
Phishing attacks remain a significant security threat in cyberspace, targeting individuals and
businesses to steal confidential information. Traditional detection methods often struggle to …

Sectrabank Model to Mitigate Computer Fraud in Electronic Operations through Banking Applications on Android Devices

J Melendez, J Noriega, J Tiznado, P Calderon… - 2024 - preprints.org
This research aims to introduce a model, SectraBank, designed to mitigate cyber fraud
attacks, specifically targeting SIM Swapping and Fake App schemes in mobile banking …

ВЕБ-РЕСУРСТАРДАҒЫ ФИШИНГТІК ХАБАРЛАМАЛАР ЖӘНЕ ОЛАРДЫ МАШИНАЛЫҚ ОҚЫТУ ӘДІСТЕРІ АРҚЫЛЫ АНЫҚТАУ

М Болатбек, Ш Мусиралиева… - Известия НАН РК …, 2022 - journals.nauka-nanrk.kz
Аннотация В настоящее время в связи с увеличением использования веб-ресурсов
увеличивается и количество видов киберпреступности. Среди них одним из наиболее …