PHISHING

作品数:66被引量:53H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张博毛波曹玖新李伟华张振翎更多>>
相关机构:西北工业大学东南大学上海交通大学国家互联网应急中心更多>>
相关期刊:《计算机技术与发展》《信息安全与通信保密》《清华大学学报(自然科学版)》《网络与信息》更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家教育部博士点基金国家重点基础研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
《Journal of Information Security》2025年第1期1-43,共43页Anastasios Papathanasiou George Liontos Athanasios Katsouras Vasiliki Liagkou Euripides Glavas 
Small and Medium-sized Enterprises (SMEs) are considered the backbone of global economy, but they often face cyberthreats which threaten their financial stability and operational continuity. This work aims to offer a ...
关键词:CYBERSECURITY CYBERCRIME SMEs (Small and Medium-Sized Enterprises) Risk Management Ransomware PHISHING Social Engineering MALWARE 
CT-GCN+:a high-performance cryptocurrency transaction graph convolutional model for phishing node classification被引量:1
《Cybersecurity》2025年第1期126-141,共16页Bingxue Fu Yixuan Wang Tao Feng 
Due to the anonymous and contract transfer nature of blockchain cryptocurrencies,they are susceptible to fraudulent incidents such as phishing.This poses a threat to the property security of users and hinders the heal...
关键词:Blockchain Information security Phishing detection Imbalance data Transaction graph 
Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems
《Computer Modeling in Engineering & Sciences》2024年第12期2165-2183,共19页Brij B.Gupta Akshat Gaurav Varsha Arya Razaz Waheeb Attar Shavi Bansal Ahmed Alhomoud Kwok Tai Chui 
supported by a grant from Hong Kong Metropolitan University (RD/2023/2.3);supported Princess Nourah bint Abdulrah-man University Researchers Supporting Project number (PNURSP2024R 343);Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia;the Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia for funding this research work through the project number“NBU-FFR-2024-1092-09”.
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional ...
关键词:PHISHING BERT convolutional neural networks email security deep learning 
Artificial Intelligence in Cybersecurity to Detect Phishing
《Journal of Computer and Communications》2024年第12期91-115,共25页Dominique Wasso Kiseki Vincent Havyarimana Désiré Lumonge Zabagunda Walumbuka Ilundu Wail Therence Niyonsaba 
Phishing is one of the most common threats on the Internet. Traditionally, detection methods have relied on blacklists and heuristic rules, but these approaches are showing their limitations in the face of rapidly evo...
关键词:Artificial Intelligence Machine Learning Deep Learning CYBERSECURITY PHISHING DETECTION ALGORITHM Supervised Learning 
Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks
《Computers, Materials & Continua》2024年第12期4109-4124,共16页Brij B.Gupta Akshat Gaurav Varsha Arya Razaz Waheeb Attar Shavi Bansal Ahmed Alhomoud Kwok Tai Chui 
supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R 343),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia;The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia for funding this research work through the Project number“NBU-FFR-2024-1092-09”.
Phishing attacks seriously threaten information privacy and security within the Internet of Things(IoT)ecosystem.Numerous phishing attack detection solutions have been developed for IoT;however,many of these are eithe...
关键词:Deep learning PHISHING Cuckoo Search cable news network(CNN) IOT ANOVA F-test 
Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT
《Computers, Materials & Continua》2024年第11期3395-3412,共18页Arar Al Tawil Laiali Almazaydeh Doaa Qawasmeh Baraah Qawasmeh Mohammad Alshinwan Khaled Elleithy 
supported by Abu Dhabi University。
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Te...
关键词:ATTACKS email phishing machine learning security representations from transformers(BERT) text classifeir natural language processing(NLP) 
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
《Journal of Information Security》2024年第4期474-493,共20页Smith Patel Vijay K. Madisetti 
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac...
关键词:Phishing Attacks Password Management Phishing Detection AI BERT Algorithm Real-Time Protection CYBERSECURITY URL Authentication 
Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm
《Computers, Materials & Continua》2024年第9期4895-4916,共22页Brij Bhooshan Gupta Akshat Gaurav Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Kwok Tai Chui 
Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R 343);PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia;Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia,for funding this researchwork through the project number“NBU-FFR-2024-1092-02”.
Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection methods.Traditional machine learning approaches to phishing detec...
关键词:Phishing detection Recurrent Neural Network(RNN) Whale Optimization Algorithm(WOA) CYBERSECURITY machine learning optimization 
A systematic review:Detecting phishing websites using data mining models
《Intelligent and Converged Networks》2023年第4期326-341,共16页Dina Jibat Sarah Jamjoom Qasem Abu Al-Haija Abdallah Qusef 
As internet technology use is on the rise globally,phishing constitutes a considerable share of the threats that may attack individuals and organizations,leading to significant losses from personal and confidential in...
关键词:PHISHING data mining machine learning ALGORITHM CLASSIFICATION 
Investigating the impact of structural and temporal behaviors in Ethereum phishing users detection
《Blockchain(Research and Applications)》2023年第4期24-38,共15页Medhasree Ghosh Dyuti Ghosh Raju Halder Joydeep Chandra 
the project(sanction order no.1/2021-22(GIA))funded by the National Informatics Centre,MeitY,Government of India.
The recent surge of Ethereum in prominence has made it an attractive target for various kinds of crypto crimes.Phishing scams,for example,are an increasingly prevalent cybercrime in which malicious users attempt to st...
关键词:Blockchain Cryptocurrency Ethereum Phishing scam Machine learning 
检索报告 对象比较 聚类工具 使用帮助 返回顶部