PhishOut: Effective phishing detection using selected features

S Paliath, MA Qbeitah, M Aldwairi - 2020 27th International …, 2020 - ieeexplore.ieee.org
Phishing emails are the first step for many of today's attacks. They come with a simple
hyperlink, request for action or a full replica of an existing service or website. The goal is …

A Predictive Model for Phishing Attacks on Mobile Intelligent Agent Systems

MD Manyama, OP Kogeda - … Conference on Computational Science and Its …, 2024 - Springer
Phishing attacks continue to evolve with time and the attackers are always ahead of the
existing mitigation plans. The more technology advances, the more sophisticated phishing …

[PDF][PDF] SAHTE İNTERNET SİTELERİNİN URL ÖZELLİKLERİ TEMELİNDE TESPİT EDİLMESİ AMACIYLA ÖZELLİK SEÇME METOTLARININ ve ÖĞRENME …

II DANIŞMAN - nek.istanbul.edu.tr
Bu uzun yolda hiç bıkmadan yanımda olan ve her ihtiyaç duyduğumda yardımıma koşan çok
değerli kardeşlerim Murat YÖNAÇ ve Muhammet ERİŞEN'e, doktora çalışmalarım boyunca …

Secure transfer of web application client persistent state information into a new domain

OS Pieczul, M Pajecki, I Pogorzelska-Pieczul… - US Patent …, 2016 - Google Patents
(57) ABSTRACT A technique to reassign one or more stored elements of web application
client state information is provided in an HTTP based client upon receipt of an HTTP redirect …

[引用][C] Phishing Detection Using Hybrid Algorithm Based on Clustering and Machine Learning

L Al-Shalabi, Y Hasan Jazyah - International Journal of …, 2024 - University of Bahrain