Works about PHISHING
Results: 761
Comparative Analysis of Undersampling, Oversampling, and SMOTE Techniques for Addressing Class Imbalance in Phishing Website Detection.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 751
- By:
- Publication type:
- Article
Particle Swarm Optimization (PSO)-based Feature Selection: An Approach for Improving Performance of Classification Model.
- Published in:
- INFOCOMP: Journal of Computer Science, 2024, v. 23, n. 2, p. 1
- By:
- Publication type:
- Article
Generative AI-based Phishing Text Generation Using Hybrid Prompt Design with Heuristic Algorithm for Multimodal Phishing Detection.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2025, v. 18, n. 2, p. 485, doi. 10.22266/ijies2025.0331.35
- By:
- Publication type:
- Article
Understanding the Role of Demographic and Psychological Factors in Users' Susceptibility to Phishing Emails: A Review.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2236, doi. 10.3390/app15042236
- By:
- Publication type:
- Article
Understanding Social Engineering Victimisation on Social Networking Sites: A Comprehensive Review of Factors Influencing User Susceptibility to Cyber-Attacks.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 153, doi. 10.3390/info16020153
- By:
- Publication type:
- Article
Hybrid BiLSTM-SVM Intrusion Detection with Decision-Based Flow Ranking.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 67, doi. 10.18280/ijsse.150107
- By:
- Publication type:
- Article
Controlling Social Engineering and Spear Phishing Attack Security with Technology Solutions in Organizations.
- Published in:
- Jurnal Indonesia Sosial Teknologi, 2025, v. 6, n. 1, p. 277, doi. 10.59141/jist.v6i1.1361
- By:
- Publication type:
- Article
How Verizon Media Built a Cybersecurity Culture.
- Published in:
- MIS Quarterly Executive, 2022, v. 21, n. 2, p. 165, doi. 10.17705/2msqe.00064
- By:
- Publication type:
- Article
URL based phishing attack detection using BiLSTM-gated highway attention block convolutional neural network.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 27, p. 69345, doi. 10.1007/s11042-023-17993-0
- By:
- Publication type:
- Article
Intelligent phishing website detection using machine learning.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 19, p. 29431, doi. 10.1007/s11042-023-14731-4
- By:
- Publication type:
- Article
ISHO: improved spotted hyena optimization algorithm for phishing website detection.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 24, p. 34677, doi. 10.1007/s11042-021-10678-6
- By:
- Publication type:
- Article
Non-lightlike framed rectifying curves in Minkowski 3-space.
- Published in:
- Electronic Research Archive, 2024, v. 32, n. 10, p. 1, doi. 10.3934/era.2024273
- By:
- Publication type:
- Article
Modeling the role of fish population in mitigating algal bloom.
- Published in:
- Electronic Research Archive, 2024, v. 32, n. 10, p. 1, doi. 10.3934/era.2024269
- By:
- Publication type:
- Article
MFCEN: A lightweight multi-scale feature cooperative enhancement network for single-image super-resolution.
- Published in:
- Electronic Research Archive, 2024, v. 32, n. 10, p. 1, doi. 10.3934/era.2024267
- By:
- Publication type:
- Article
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks.
- Published in:
- Electronic Research Archive, 2024, v. 32, n. 10, p. 1, doi. 10.3934/era.2024259
- By:
- Publication type:
- Article
A collaborative prediction approach to defend against amplified reflection and exploitation attacks.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 10, p. 1, doi. 10.3934/era.2023308
- By:
- Publication type:
- Article
SAFER SENIOR CITIZENS ONLINE.
- Published in:
- Forum Pedagogiczne / Pedagogical Forum, 2024, v. 14, n. 2, p. 215, doi. 10.21697/fp.2024.2.2.17
- By:
- Publication type:
- Article
NUEVAS TECNOLOGÍAS, ESTAFA INFORMÁTICA E IGNORANCIA DELIBERADA.
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2023, v. 12, n. 1, p. 1
- By:
- Publication type:
- Article
TECHNOLOGICAL ASPECT OF THE GLOBAL ARCHITECTURE OF THE SECURITY OPERATION CENTRE OF AN ORGANISATION.
- Published in:
- Archaeology & Science / Arheologija i Prirodne Nauke, 2021, v. 17, p. 167, doi. 10.18485/arhe_apn.2021.17.11
- By:
- Publication type:
- Article
Roles of Feedback and Phishing Characteristics in Antiphishing Training Performance: Perspectives of Goal Setting and Skill Acquisition.
- Published in:
- Journal of the Association for Information Systems, 2024, v. 25, n. 4, p. 1037, doi. 10.17705/1jais.00854
- By:
- Publication type:
- Article
An Empirical Investigation of The Unintended Consequences of Vulnerability Assessments Leading to Betrayal.
- Published in:
- Journal of the Association for Information Systems, 2024, v. 25, n. 4, p. 1079, doi. 10.17705/1jais.00875
- By:
- Publication type:
- Article
Got Phished? Internet Security and Human Vulnerability.
- Published in:
- Journal of the Association for Information Systems, 2017, v. 18, n. 1, p. 22
- By:
- Publication type:
- Article
Overconfidence in Phishing Email Detection.
- Published in:
- Journal of the Association for Information Systems, 2016, v. 17, n. 11, p. 759
- By:
- Publication type:
- Article
Phishing detection tool for financial emails.
- Published in:
- International Journal of Financial Engineering, 2024, v. 11, n. 4, p. 1, doi. 10.1142/S2424786324420027
- By:
- Publication type:
- Article
基于改进 Stacking 策略的钓鱼网站检测研究.
- Published in:
- Journal of Guangxi Normal University - Natural Science Edition, 2022, v. 40, n. 3, p. 132, doi. 10.16088/j.issn.1001-6600.2021071201
- By:
- Publication type:
- Article
INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2024, v. 12, n. 2, p. 416, doi. 10.21923/jesd.1458955
- By:
- Publication type:
- Article
Optimal fusion of multiple GNSS signals against spoofing sources.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 4, p. 3289, doi. 10.3906/elk-1604-123
- By:
- Publication type:
- Article
Phishing Attacks Cybersecurity.
- Published in:
- ISSA Journal, 2022, v. 20, n. 8, p. 15
- By:
- Publication type:
- Article
Spoofing a Hardware Security Module.
- Published in:
- ISSA Journal, 2019, v. 17, n. 1, p. 24
- By:
- Publication type:
- Article
Our Journey in Phishing Mitigation.
- Published in:
- ISSA Journal, 2018, v. 16, n. 12, p. 17
- By:
- Publication type:
- Article
Spoofing a Hardware Security Module.
- Published in:
- ISSA Journal, 2018, v. 16, n. 6, p. 33
- By:
- Publication type:
- Article
A Cautionary Phishing Tale.
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 8
- By:
- Publication type:
- Article
Building a Phishing Program: Why Haven't You Started Yet?
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 28
- By:
- Publication type:
- Article
Stop Delivery of Phishing Emails.
- Published in:
- ISSA Journal, 2016, v. 14, n. 7, p. 41
- By:
- Publication type:
- Article
Attention-Based 1D CNN-BiLSTM Hybrid Model Enhanced with FastText Word Embedding for Korean Voice Phishing Detection †.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 14, p. 3217, doi. 10.3390/math11143217
- By:
- Publication type:
- Article
Intelligent Ensemble Learning Approach for Phishing Website Detection Based on Weighted Soft Voting.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 21, p. 2799, doi. 10.3390/math9212799
- By:
- Publication type:
- Article
Die Daten an der Angel: Über Social Engineering zum großen Datenfang.
- Published in:
- IM + io, 2023, n. 3, p. 62
- By:
- Publication type:
- Article
Komm, wir gehen phishen: Phishingmails als Übung für Behörden.
- Published in:
- IM + io, 2023, n. 3, p. 58
- By:
- Publication type:
- Article
Sweet Like Honey: Hacker in die Falle gelockt.
- Published in:
- IM + io, 2023, n. 3, p. 24
- By:
- Publication type:
- Article
Cybercrime Scene.
- Published in:
- IM + io, 2023, n. 3, p. 3
- By:
- Publication type:
- Article
PHISHING A PROBLÉMY S JEHO TRESTNĚPRÁVNÍ KVALIFIKACÍ V TEORII A PRAXI.
- Published in:
- Acta Universitatis Carolinae Iuridica, 2012, n. 4, p. 57
- By:
- Publication type:
- Article
THE IMPACT OF EMPLOYEES' CYBER-AWARENESS TRAINING ON THE EFFECTIVENESS OF PHISHING ATTACKS.
- Published in:
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2024, v. 24, n. 47, p. 1
- By:
- Publication type:
- Article
COMPUTER CRIME DURING THE COVID 19 PANDEMIC.
- Published in:
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2022, v. 22, n. 42, p. 133
- By:
- Publication type:
- Article
Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime.
- Published in:
- European Journal on Criminal Policy & Research, 2017, v. 23, n. 3, p. 287, doi. 10.1007/s10610-016-9332-z
- By:
- Publication type:
- Article
Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation.
- Published in:
- TEM Journal, 2022, v. 11, n. 2, p. 543, doi. 10.18421/TEM112-07
- By:
- Publication type:
- Article
Detecting the Phishing Website with the Highest Accuracy.
- Published in:
- TEM Journal, 2021, v. 10, n. 2, p. 947, doi. 10.18421/TEM102-58
- By:
- Publication type:
- Article
Phishing URL detection with neural networks: an empirical study.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-74725-6
- By:
- Publication type:
- Article
SPOOFING CYBER ATTACK DETECTION IN PROBE-BASED TRAFFIC MONITORING SYSTEMS USING MIXED INTEGER LINEAR PROGRAMMING.
- Published in:
- Networks & Heterogeneous Media, 2013, v. 8, n. 3, p. 783, doi. 10.3934/nhm.2013.8.783
- By:
- Publication type:
- Article
A cognitive approach to the decision to trust or distrust phishing emails.
- Published in:
- International Transactions in Operational Research, 2023, v. 30, n. 3, p. 1263, doi. 10.1111/itor.12963
- By:
- Publication type:
- Article
A lightweight and proactive rule-based incremental construction approach to detect phishing scam.
- Published in:
- Information Technology & Management, 2022, v. 23, n. 4, p. 271, doi. 10.1007/s10799-021-00351-7
- By:
- Publication type:
- Article