Zobrazeno 1 - 10
of 935
pro vyhledávání: '"Phishing detection"'
Autor:
K. S. Jishnu, B. Arthi
Publikováno v:
Automatika, Vol 65, Iss 4, Pp 1621-1639 (2024)
The rise of cyber threats, particularly URL-based phishing attacks, has tarnished the digital age despite its unparalleled access to information. These attacks often deceive users into disclosing confidential information by redirecting them to fraudu
Externí odkaz:
https://doaj.org/article/08b7241307d043baa6bb0d9bb7c9b02f
Autor:
Ao Xiong, Yuanzheng Tong, Chengling Jiang, Shaoyong Guo, Sujie Shao, Jing Huang, Wei Wang, Baozhen Qi
Publikováno v:
IET Blockchain, Vol 4, Iss 3, Pp 226-234 (2024)
Abstract With the development of blockchain, cryptocurrencies are also showing a boom. However, due to the decentralized and anonymous nature of blockchain, cryptocurrencies have inevitably become a hotbed for fraudulent crimes. For example, phishing
Externí odkaz:
https://doaj.org/article/a6316feab6d1418bbd040e2bb440bf5a
Publikováno v:
网络与信息安全学报, Vol 10, Iss 4, Pp 123-131 (2024)
Phishing has been the primary means utilized by attackers to conduct cyber fraud. As national anti-cyber fraud efforts continue to increase, the technical confrontation of various phishing activities has also escalated, bringing significant pressure
Externí odkaz:
https://doaj.org/article/b3bb450030274ceeab3599f290568374
Publikováno v:
Journal of Information Security and Cybercrimes Research, Vol 7, Iss 1, Pp 05-28 (2024)
In an era characterized by the ubiquity of the internet, the proliferation of online services, and the increasing frequency of cyber threats, the detection of look-alike domains has become a critical component of cybersecurity. The current paper pres
Externí odkaz:
https://doaj.org/article/84f948afd7ab43cd83c46be6ef4ecf78
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-22 (2024)
Abstract Despite the growing attention on blockchain, phishing activities have surged, particularly on newly established chains. Acknowledging the challenge of limited intelligence in the early stages of new chains, we propose ADA-Spear-an automatic
Externí odkaz:
https://doaj.org/article/d561e79b87334fb99b6ce12eee469ada
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
IntroductionThe dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In light of this, new gaps have emerged in phishing detection, including the
Externí odkaz:
https://doaj.org/article/f8b544e7d2e745ec9a5204318b48e616
Autor:
Fouad Trad, Ali Chehab
Publikováno v:
Machine Learning and Knowledge Extraction, Vol 6, Iss 1, Pp 367-384 (2024)
Large Language Models (LLMs) are reshaping the landscape of Machine Learning (ML) application development. The emergence of versatile LLMs capable of undertaking a wide array of tasks has reduced the necessity for intensive human involvement in train
Externí odkaz:
https://doaj.org/article/1a81b1476f984680a4e8fe1eff7a4d31
Autor:
Wulan Sri Lestari, Mustika Ulina
Publikováno v:
Teknika, Vol 13, Iss 1, Pp 71-76 (2024)
Phishing attacks are crimes committed by sending spoofed Web URLs that appear to come from a legitimate organization in order to obtain another party's sensitive information, such as usernames, passwords, and other confidential data. The stolen infor
Externí odkaz:
https://doaj.org/article/881afa3880714e6ab7ba684e7682b31e
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-16 (2024)
Abstract Due to the anonymous and contract transfer nature of blockchain cryptocurrencies, they are susceptible to fraudulent incidents such as phishing. This poses a threat to the property security of users and hinders the healthy development of the
Externí odkaz:
https://doaj.org/article/f6647d09f73f4265bd61c41bb5df939c
Publikováno v:
IEEE Access, Vol 12, Pp 52951-52962 (2024)
Voice phishing is the criminal act of tricking others to transfer funds or to seek financial gain based on personal information obtained illegally. The importance of this crime is recognized worldwide, and technical solutions have been proposed to re
Externí odkaz:
https://doaj.org/article/a20cf6cfd93b4e68b51875e62306a086