Zobrazeno 1 - 10
of 522
pro vyhledávání: '"Phishing attack"'
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 9, Iss 6, Pp 1453-1482 (2024)
Securing the information from the attackers is a crucial aspect of modern digital life. Numerous cryptographic algorithms are employed to provide security for data transmission. Among these, the International Data Encryption Algorithm (IDEA) stands o
Externí odkaz:
https://doaj.org/article/4ff3dd8c315c426ca66176f22f101f4a
Autor:
Tajamul Shahzad, Kashif Aman
Publikováno v:
Journal of Informatics and Web Engineering, Vol 3, Iss 2, Pp 116-133 (2024)
Phishing poses a significant challenge in an ever-evolving world. The increased usage of the Internet has resulted in the emergence of a different kind of theft referred to as cybercrime. The term cybercrime describes the act of invading privacy and
Externí odkaz:
https://doaj.org/article/90058554a6a54554b851664555648b61
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
IntroductionThe dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In light of this, new gaps have emerged in phishing detection, including the
Externí odkaz:
https://doaj.org/article/f8b544e7d2e745ec9a5204318b48e616
Publikováno v:
IEEE Access, Vol 12, Pp 8052-8070 (2024)
In today’s digital landscape, the increasing prevalence of internet-connected devices, including smartphones, personal computers, and IoT devices, has enabled users to perform a wide range of daily activities such as shopping, banking, and communic
Externí odkaz:
https://doaj.org/article/a382a1ee312043019db29dd0d182ef0d
Publikováno v:
IEEE Access, Vol 12, Pp 8373-8389 (2024)
Protecting against interference is essential at a time when wireless communications are essential for sending large amounts of data. Our research presents a novel deep learning technique, the ResNeXt method and embedded Gated Recurrent Unit (GRU) mod
Externí odkaz:
https://doaj.org/article/7642894402ef43f78993a796390bf9ee
Publikováno v:
Information, Vol 15, Iss 5, p 265 (2024)
In South Korea, the rapid proliferation of smartphones has led to an uptick in messenger phishing attacks associated with electronic communication financial scams. In response to this, various phishing detection algorithms have been proposed. However
Externí odkaz:
https://doaj.org/article/99aa38b01efb4dbbbce17958334f3de2
Publikováno v:
网络与信息安全学报, Vol 9, Pp 1-17 (2023)
Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduce
Externí odkaz:
https://doaj.org/article/ac4a2b448fc44e5a8265fb6b326c38e5
Autor:
kibreab adane, Berhanu Beyene
Publikováno v:
International Journal of Information Science and Management, Vol 21, Iss 1, Pp 245-262 (2023)
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activity, not all online users have the same knowledge and skills when determining the credibility of visited websites and email content. As a result, phis
Externí odkaz:
https://doaj.org/article/7a131e9dd0a74cfcb5325c096fa92242
Autor:
majeed jasim, Loay E. George
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 4, Iss 3 (2023)
Today's world is heading towards complete digital transformation, and with all its advantages, this transformation involves many risks, the most important of which is phishing. This paper proposes a system that classifies the email as phishing or leg
Externí odkaz:
https://doaj.org/article/6055d5f6c52046f890aaeb9a0cca71a1
Publikováno v:
Future Internet, Vol 16, Iss 3, p 86 (2024)
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email atta
Externí odkaz:
https://doaj.org/article/8e807d13f58a4e60acd5fd130ab651ff