Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …

[HTML][HTML] A predictive model for phishing detection

AA Orunsolu, AS Sodiya, AT Akinwale - Journal of King Saud University …, 2022 - Elsevier
Nowadays, many anti-phishing systems are being developed to identify phishing contents in
online communication systems. Despite the availability of myriads anti-phishing systems …

[HTML][HTML] PhiDMA–A phishing detection model with multi-filter approach

G Sonowal, KS Kuppusamy - Journal of King Saud University-Computer …, 2020 - Elsevier
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal
sensitive information from victims by providing a fake site which looks like the visual clone of …

Phishing detection: A recent intelligent machine learning comparison based on models content and features

N Abdelhamid, F Thabtah… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
In the last decade, numerous fake websites have been developed on the World Wide Web to
mimic trusted websites, with the aim of stealing financial assets from users and …

A phishing detection system based on machine learning

CY Wu, CC Kuo, CS Yang - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
As the Internet has become an essential part of human beings' lives, a growing number of
people are enjoying the convenience brought by the Internet, while more are attacks coming …

AntiPhishStack: LSTM-based stacked generalization model for optimized phishing URL detection

S Aslam, H Aslam, A Manzoor, H Chen, A Rasool - Symmetry, 2024 - mdpi.com
The escalating reliance on revolutionary online web services has introduced heightened
security risks, with persistent challenges posed by phishing despite extensive security …

Data mining a way to solve Phishing Attacks

PK Sahoo - 2018 International Conference on Current Trends …, 2018 - ieeexplore.ieee.org
With the ever increasing use of Internet by different stake holders in various fields,
information on web browsers and servers is highly susceptible to different security attacks …

Identification of phishing attacks using machine learning algorithm

PM Dinesh, M Mukesh, B Navaneethan… - E3S Web of …, 2023 - e3s-conferences.org
Phishing is a particular type of cybercrime that allows criminals to trick people and steal
crucial data. The phishing assault has developed into a more complex attack vector since …

PhishStack: evaluation of stacked generalization in phishing URLs detection

SSMM Rahman, T Islam, MI Jabiullah - Procedia Computer Science, 2020 - Elsevier
Stacked Generalization has been assessed and evaluated in the field of Phishing URLs
detection. This field has become egregious area of information security. Recently, different …

A lightweight and proactive rule-based incremental construction approach to detect phishing scam

M SatheeshKumar, KG Srinivasagan… - Information Technology …, 2022 - Springer
The development of digitization over the globe has made digital security inescapable. As
every single article on this planet is being digitalized quickly, it is more important to protect …