|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Sibel Kapan and Efnan Sora Gunal
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and...
ver más
|
|
|
|
|
|
|
Tommy Nguyen, Garnet Yeates, Tony Ly and Umar Albalawi
With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in security ...
ver más
|
|
|
|
|
|
|
Kunj Joshi, Chintan Bhatt, Kaushal Shah, Dwireph Parmar, Juan M. Corchado, Alessandro Bruno and Pier Luigi Mazzeo
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the cha...
ver más
|
|
|
|
|
|
|
Prosper Kandabongee Yeng, Muhammad Ali Fauzi, Bian Yang and Peter Nimbe
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ranso...
ver más
|
|
|
|
|
|
|
Molly Dewis and Thiago Viana
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate cyber security. Despite solutions to aid organisations, many are susceptible to phishing and spam emails which can make an unwanted impact if not mitigated. Traits t...
ver más
|
|
|
|
|
|
|
Raid W. Amin, Hakki Erhan Sevil, Salih Kocak, Guillermo Francia III and Philip Hoover
In this study, we aimed to identify spatial clusters of countries with high rates of cyber attacks directed at other countries. The cyber attack dataset was obtained from Canadian Institute for Cybersecurity, with over 110,000 Uniform Resource Locators (...
ver más
|
|
|
|
|
|
|
Andrei Butnaru, Alexios Mylonas and Nikolaos Pitropakis
Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. However, the pervasiveness of web browsing in our daily life does not come withou...
ver más
|
|
|
|
|
|
|
Mike Nkongolo, Jacobus Philippus van Deventer and Sydney Mambwe Kasongo
This research attempts to introduce the production methodology of an anomaly detection dataset using ten desirable requirements. Subsequently, the article presents the produced dataset named UGRansome, created with up-to-date and modern network traffic (...
ver más
|
|
|
|
|
|
|
Ammar Jamil Odeh,Ismail Keshta,Eman Abdelfattah
Pág. pp. 22 - 31
Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming websites. In this paper, a novel approach is utilized that uses a Neural Network with a multilayer perceptron to detect the scam URL. The proposed system impro...
ver más
|
|
|
|