A Safi, S Singh - Journal of King Saud University-Computer and …, 2023 - Elsevier
Phishing is a fraud attempt in which an attacker acts as a trusted person or entity to obtain sensitive information from an internet user. In this Systematic Literature Survey (SLR) …
P Yang, G Zhao, P Zeng - IEEE access, 2019 - ieeexplore.ieee.org
As a crime of employing technical means to steal sensitive information of users, phishing is currently a critical threat facing the Internet, and losses due to phishing are growing steadily …
S Alnemari, M Alshammari - Applied Sciences, 2023 - mdpi.com
Phishing is an online threat where an attacker impersonates an authentic and trustworthy organization to obtain sensitive information from a victim. One example of such is trolling …
Phishing attacks are on the increase, resulting in financial loss and theft of sensitive information to online services and users. Anti-phishing approaches have concentrated on …
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly. With the …
Phishing is an online fraud that deceives visitors by impersonating a legitimate website to steal their confidential or personal information. This is a well-known form of cybercrime. With …
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li… - EURASIP Journal on …, 2019 - Springer
The web technology has become the cornerstone of a wide range of platforms, such as mobile services and smart Internet-of-things (IoT) systems. In such platforms, users' data are …
A Mehboob, MSI Malik - Arabian Journal for Science and Engineering, 2021 - Springer
Online recruitment has altered the hiring trend. Specifically, posting job ads on career portals and corporate sites involves seeking a large pool of professional applicants around …
S Shukla, M Misra, G Varshney - Transactions on Emerging …, 2024 - Wiley Online Library
In the past, many techniques like blacklisting/whitelisting, third‐party, search engine, visual similarity, heuristic, URL features, and website content were used for anti‐phishing. Search …