S Shukla, M Misra, G Varshney - Transactions on Emerging …, 2024 - Wiley Online Library
In the past, many techniques like blacklisting/whitelisting, third‐party, search engine, visual similarity, heuristic, URL features, and website content were used for anti‐phishing. Search …
AUZ Asif, H Shirazi, I Ray - … Symposium on Stabilizing, Safety, and Security …, 2023 - Springer
Phishing is a social engineering attack in which an attacker sends a fraudulent message to a user in the hope of obtaining sensitive confidential information. Machine learning appears to …
Abstract Cross-Site Scripting (XSS) remains a significant threat to web application security, exploiting vulnerabilities to hijack user sessions and steal sensitive data. Traditional …
D Jibat, S Jamjoom, QA Al-Haija… - Intelligent and …, 2023 - ieeexplore.ieee.org
As internet technology use is on the rise globally, phishing constitutes a considerable share of the threats that may attack individuals and organizations, leading to significant losses from …
The rapid growth of the Internet has led to an increased demand for online services. However, this surge in online activity has also brought about a new threat: phishing attacks …
Introduction Phishing attacks pose a significant threat to online security by deceiving users into divulging sensitive information through fraudulent websites. Traditional anti-phishing …
It has become absolutely necessary to identify malicious URLs in real time due to the growing number of cyber-attacks and fraudulent activities that take place on the internet …