[HTML][HTML] The applicability of a hybrid framework for automated phishing detection

RJ van Geest, G Cascavilla, J Hulstijn, N Zannone - Computers & Security, 2024 - Elsevier
Phishing attacks are a critical and escalating cybersecurity threat in the modern digital
landscape. As cybercriminals continually adapt their techniques, automated phishing …

A State-of-the-art Review on Phishing Website Detection Techniques

W Li, S Manickam, YW Chong, W Leng… - IEEE Access, 2024 - ieeexplore.ieee.org
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as
a primary tool for attackers to deceive users and steal sensitive information. The rapid …

A novel method for bioinformatics analysis in gene expression profiling framework for personalized healthcare applications

K Natarajan, P Natarajan, S Muthusamy… - Multimedia Tools and …, 2024 - Springer
In recent years, personalized health care has been propelled by patient-centric health plans
enabled by customized medical technologies made possible by scientific and technological …

The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks

A Meleshko, V Desnitsky - Telecom, 2024 - mdpi.com
This article discusses the modeling and detection of attacks in self-organizing decentralized
wireless sensor networks (WSNs) that can be applied to various critical scenarios in …

Can Features for Phishing URL Detection Be Trusted Across Diverse Datasets? A Case Study with Explainable AI

M Mia, D Derakhshan, MMA Pritom - Proceedings of the 11th …, 2024 - dl.acm.org
Phishing has been a prevalent cyber threat that manipulates users into revealing sensitive
private information through deceptive tactics, designed to masquerade as trustworthy …

Defending Against Digital Threats: Machine Learning Techniques for Cyber Persecution Detection

P Chinnasamy, RK Ayyasamy… - … and Data Sciences …, 2024 - ieeexplore.ieee.org
Cyber persecution has become a widespread problem on the social media. It has resulted in
omissions such as suicide and sadness. Content regulation on social media sites is …

Enhancing Online Safety: Phishing URL Detection Using Machine Learning and Explainable AI

BV Pavani, D Mahitha… - 2024 15th International …, 2024 - ieeexplore.ieee.org
With the rapid growth of the internet and online transactions, phishing attacks have become
a prevalent cyber threat. Deceptive URLs are frequently used in phishing attempts to trick …

Fake Social Media Profile Identification and Report Using Machine Learning

P Chinnasamy, RK Ayyasamy… - 2024 International …, 2024 - ieeexplore.ieee.org
In the digital age, Online Social Networking platforms are integral to daily life, but they also
attract malicious bots that mimic human behaviour and pose cybersecurity threats. This …

An Efficient Machine Learning Approach for Detecting Malwares in IoT Environment

R Kumar, A Anand, N Singh, D Singh… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
In recent research it is observed that malwares in shared system have grown significantly
over the previous decade, inflicting significant financial losses to a variety of enterprises …

[PDF][PDF] Healthcare Intrusion Detection using Hybrid Correlation-based Feature Selection-Bat Optimization Algorithm with Convolutional Neural Network: A Hybrid …

HK Bella, S Vasundra - … Journal of Advanced Computer Science & …, 2024 - researchgate.net
Cloud computing is popular among users in various areas such as healthcare, banking, and
education due to its low-cost services alongside increased reliability and efficiency. But …