Machine learning models for phishing detection from TLS traffic

M Kumar, C Kondaiah, AR Pais, RS Rao - Cluster Computing, 2023 - Springer
Phishing is a fraudulent tactic for attackers to obtain victims personal information, such as
passwords, account details, credit card details, and other sensitive information. Existing anti …

Protective factors for develo** cognitive skills against cyberattacks

M Cazares, W Fuertes, R Andrade, I Ortiz-Garcés… - Electronics, 2023 - mdpi.com
Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during
the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online …

Deep learning approaches for intrusion detection with emerging cybersecurity challenges

S Hemalatha, M Mahalakshmi… - 2023 International …, 2023 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) play a pivotal role in preventing computer networks from
an ever-evolving landscape of cybersecurity threats. As cyberattacks become increasingly …

A survey on social network's anomalous behavior detection

L **ng, S Li, Q Zhang, H Wu, H Ma, X Zhang - Complex & Intelligent …, 2024 - Springer
The onset of Web 3.0 has catalyzed the rapid advancement of social networking,
transforming platforms into essential elements deeply embedded within the fabric of daily …

Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm.

BB Gupta, A Gaurav, RW Attar, V Arya… - Computers …, 2024 - search.ebscohost.com
Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,
necessitating the development of more sophisticated detection methods. Traditional …

A Machine Learning Approach for Phishing Attack Detection

T Choudhary, S Mhapankar, R Bhddha… - Journal of Artificial …, 2023 - ojs.istp-press.com
Phishing is the easiest method for gathering sensitive information from unwary people.
Phishers seek to get private data including passwords, login information, and bank account …

A developed model based on machine learning algorithms for phishing website detection

H Abdel-Jaber, H Al Bazar… - Recent Advances in …, 2025 - benthamdirect.com
Introduction Users are accessing websites for many purposes, such as obtaining information
about a particular topic, buying items, accessing their accounts, etc. Cybercriminals use …

User behavior data analysis and product design optimization algorithm based on deep learning

L Liang, Y Ke - International Journal on Interactive Design and …, 2023 - Springer
In modern society, user behavior data analysis and product design optimization have
become one of the key factors for the success of enterprises. Traditional methods are usually …

A hybrid dimensionality reduction for network intrusion detection

H Ghani, S Salekzamankhani, B Virdee - Journal of Cybersecurity and …, 2023 - mdpi.com
Due to the wide variety of network services, many different types of protocols exist,
producing various packet features. Some features contain irrelevant and redundant …

A secure mechanism for prevention of vishing attack in banking system

DRD Brabin, S Bojjagani - 2023 International conference on …, 2023 - ieeexplore.ieee.org
A vishing attack is a category of Phishing attack in which the attacker attempts to capture
clandestine information through a phone call or Short Message Service (SMS). These types …