Classification of Virtual harassment on social networks using ensemble learning techniques

NA Azeez, E Fadhal - Applied Sciences, 2023 - mdpi.com
Background: Internet social media platforms have become quite popular, enabling a wide
range of online users to stay in touch with their friends and relatives wherever they are at …

[HTML][HTML] SoK: The past decade of user deception in emails and today's email clients' susceptibility to phishing techniques

MF Veit, O Wiese, FL Ballreich, M Volkamer… - Computers & …, 2025 - Elsevier
User deception in emails is still one of the biggest security risks companies and end-users
face alike. Attackers try to mislead their victims when assessing whether emails are …

Cyberattack Detection: Performance Evaluation of Long Short-Term Memory Network and Convolutional Neural Network

NA Azeez, ET Olayiwola, C Van der Vyver - International Conference on …, 2024 - Springer
The rapid growth, complexity, and widespread application of the Internet of Things has
undoubtedly created room for the introduction of new efficient Intrusion Detection Systems …

A Gamified Technique to Improve Users' Phishing and Typosquatting Awareness

A Omotosho, D Awazie, P Ayegba… - … and Applications: Third …, 2021 - Springer
Security is an important aspect of technology and it requires continuous attention, but the
user agent plays a crucial role in cyber risks that sensitive data are exposed to. Users' …

A Proposal Phishing Attack Detection System on Twitter

K Boukhalfa, MA Guelmaoui, A Saidani… - International Journal of …, 2022 - igi-global.com
The security of personal data is crucial for a company or any individual. Phishing is one of
the most common and dangerous cybercrime attacks. These attacks aim to steal information …

A Gamified Technique to Improve Users' Phishing and Typosquatting Awareness

J Emuoyibofarhe - … , ICTA 2020, Minna, Nigeria, November 24 …, 2021 - books.google.com
Security is an important aspect of technology and it requires continuous attention, but the
user agent plays a crucial role in cyber risks that sensitive data are exposed to. Users' …

[PDF][PDF] How Many Phish Can Tweet?

SJ Bell - 2020 - pure.royalholloway.ac.uk
Phishing and malware attacks continue to plague the digital world; wreaking havoc on
individuals, businesses, and governments worldwide. Attacks often target popular platforms …