Small and Medium-sized Enterprises (SMEs) are considered the backbone of global economy, but they often face cyberthreats which threaten their financial stability and operational continuity. This work aims to offer a ...
Due to the anonymous and contract transfer nature of blockchain cryptocurrencies,they are susceptible to fraudulent incidents such as phishing.This poses a threat to the property security of users and hinders the heal...
supported by a grant from Hong Kong Metropolitan University (RD/2023/2.3);supported Princess Nourah bint Abdulrah-man University Researchers Supporting Project number (PNURSP2024R 343);Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia;the Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia for funding this research work through the project number“NBU-FFR-2024-1092-09”.
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive data.This study introduces a phishing email detection framework that combines Bidirectional ...
Phishing is one of the most common threats on the Internet. Traditionally, detection methods have relied on blacklists and heuristic rules, but these approaches are showing their limitations in the face of rapidly evo...
supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R 343),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia;The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia for funding this research work through the Project number“NBU-FFR-2024-1092-09”.
Phishing attacks seriously threaten information privacy and security within the Internet of Things(IoT)ecosystem.Numerous phishing attack detection solutions have been developed for IoT;however,many of these are eithe...
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Te...
In the digital age, phishing attacks have been a persistent security threat leveraged by traditional password management systems that are not able to verify the authenticity of websites. This paper presents an approac...
Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2024R 343);PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia;Deanship of Scientific Research at Northern Border University,Arar,Kingdom of Saudi Arabia,for funding this researchwork through the project number“NBU-FFR-2024-1092-02”.
Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,necessitating the development of more sophisticated detection methods.Traditional machine learning approaches to phishing detec...
As internet technology use is on the rise globally,phishing constitutes a considerable share of the threats that may attack individuals and organizations,leading to significant losses from personal and confidential in...
the project(sanction order no.1/2021-22(GIA))funded by the National Informatics Centre,MeitY,Government of India.
The recent surge of Ethereum in prominence has made it an attractive target for various kinds of crypto crimes.Phishing scams,for example,are an increasingly prevalent cybercrime in which malicious users attempt to st...