Machine learning models for phishing detection from TLS traffic
Phishing is a fraudulent tactic for attackers to obtain victims personal information, such as
passwords, account details, credit card details, and other sensitive information. Existing anti …
passwords, account details, credit card details, and other sensitive information. Existing anti …
Protective factors for develo** cognitive skills against cyberattacks
Cyberattacks capitalize on human behaviors. The prevalence of cyberattacks surged during
the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online …
the COVID-19 pandemic, fueled by the increased interconnectivity of individuals on online …
Deep learning approaches for intrusion detection with emerging cybersecurity challenges
S Hemalatha, M Mahalakshmi… - 2023 International …, 2023 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) play a pivotal role in preventing computer networks from
an ever-evolving landscape of cybersecurity threats. As cyberattacks become increasingly …
an ever-evolving landscape of cybersecurity threats. As cyberattacks become increasingly …
A survey on social network's anomalous behavior detection
L **ng, S Li, Q Zhang, H Wu, H Ma, X Zhang - Complex & Intelligent …, 2024 - Springer
The onset of Web 3.0 has catalyzed the rapid advancement of social networking,
transforming platforms into essential elements deeply embedded within the fabric of daily …
transforming platforms into essential elements deeply embedded within the fabric of daily …
Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm.
BB Gupta, A Gaurav, RW Attar, V Arya… - Computers …, 2024 - search.ebscohost.com
Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape,
necessitating the development of more sophisticated detection methods. Traditional …
necessitating the development of more sophisticated detection methods. Traditional …
A Machine Learning Approach for Phishing Attack Detection
T Choudhary, S Mhapankar, R Bhddha… - Journal of Artificial …, 2023 - ojs.istp-press.com
Phishing is the easiest method for gathering sensitive information from unwary people.
Phishers seek to get private data including passwords, login information, and bank account …
Phishers seek to get private data including passwords, login information, and bank account …
A developed model based on machine learning algorithms for phishing website detection
H Abdel-Jaber, H Al Bazar… - Recent Advances in …, 2025 - benthamdirect.com
Introduction Users are accessing websites for many purposes, such as obtaining information
about a particular topic, buying items, accessing their accounts, etc. Cybercriminals use …
about a particular topic, buying items, accessing their accounts, etc. Cybercriminals use …
User behavior data analysis and product design optimization algorithm based on deep learning
L Liang, Y Ke - International Journal on Interactive Design and …, 2023 - Springer
In modern society, user behavior data analysis and product design optimization have
become one of the key factors for the success of enterprises. Traditional methods are usually …
become one of the key factors for the success of enterprises. Traditional methods are usually …
A hybrid dimensionality reduction for network intrusion detection
H Ghani, S Salekzamankhani, B Virdee - Journal of Cybersecurity and …, 2023 - mdpi.com
Due to the wide variety of network services, many different types of protocols exist,
producing various packet features. Some features contain irrelevant and redundant …
producing various packet features. Some features contain irrelevant and redundant …
A secure mechanism for prevention of vishing attack in banking system
A vishing attack is a category of Phishing attack in which the attacker attempts to capture
clandestine information through a phone call or Short Message Service (SMS). These types …
clandestine information through a phone call or Short Message Service (SMS). These types …