Social engineering attacks prevention: A systematic literature review
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering attacks occur when victims do not recognize methods, models, and …
UAV-assisted IoT applications, cybersecurity threats, AI-enabled solutions, open challenges with future research directions
Unnamed Ariel Vehicle-assisted-Internet of Things (UAV-assisted IoT) applications have
emerged as a powerful integrated technology, showcasing remarkable results in many …
emerged as a powerful integrated technology, showcasing remarkable results in many …
Healthcare internet of things: Security threats, challenges and future research directions
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …
A FKPCA-GWO WDBiLSTM classifier for intrusion detection system in cloud environments
TV Geetha, AJ Deepa - Knowledge-Based Systems, 2022 - Elsevier
Due to the expansion of Internet traffic and threats in the cloud environment, intrusion
detection is becoming more challenging. Attackers may try to exploit various application …
detection is becoming more challenging. Attackers may try to exploit various application …
Ensemble-based logistic model trees for website phishing detection
The adverse effects of website phishing attacks are often damaging and dangerous as the
information gathered from unsuspecting users are used inappropriately and recklessly …
information gathered from unsuspecting users are used inappropriately and recklessly …
[PDF][PDF] Cybercrime Detection and Prevention Efforts in the Last Decade: An Overview of the Possibilities of Machine Learning Models.
According to a report titled “cyberwarfare in the c-suite” released on January 21 2021 by
Steve Morgan of the cybercrime magazine, cybercrime is projected to unleash global …
Steve Morgan of the cybercrime magazine, cybercrime is projected to unleash global …
Integrating machine learning for sustaining cybersecurity in digital banks
Cybersecurity continues to be an important concern for financial institutions given the
technology's rapid development and increasing adoption of digital services. Effective safety …
technology's rapid development and increasing adoption of digital services. Effective safety …
Improving the phishing website detection using empirical analysis of Function Tree and its variants
The phishing attack is one of the most complex threats that have put internet users and
legitimate web resource owners at risk. The recent rise in the number of phishing attacks has …
legitimate web resource owners at risk. The recent rise in the number of phishing attacks has …
[PDF][PDF] Intelligent tree-based ensemble approaches for phishing website detection
The adverse effects of phishing attacks on unsuspecting victims are damaging and
nefarious. Stealing of information from unsuspecting users surges on the internet and …
nefarious. Stealing of information from unsuspecting users surges on the internet and …
Techniques to detect fake profiles on social media using the new age algorithms-A Survey
This research explores the growing issue of fake accounts in Online Social Networks
[OSNs]. While platforms like Twitter, Instagram, and Facebook foster connections, their lax …
[OSNs]. While platforms like Twitter, Instagram, and Facebook foster connections, their lax …