نتایج جستجو برای: phishing detection

تعداد نتایج: 567318  

Journal: :Trends in computer science and information technology 2021

In the direct simulation Monte Carlo method and multi-phase flow calculations, structured unstructured grid systems for complex geometries necessitate time-consuming process of searching a large number cells to position target particles.

2012
Max-Emanuel Maurer Lukas Höfer

Phishing attacks rise in quantity and quality. With short online lifetimes of those attacks, classical blacklist based approaches are not su cient to protect online users. While attackers manage to achieve high similarity between original and fraudulent websites, this fact can also be used for attack detection. In many cases attackers try to make the Internet address (URL) from a website look s...

2012
Venkatesh Ramanathan Harry Wechsler

Identity theft is one of the most profitable crimes committed by felons. In the cyber space, this is commonly achieved using phishing. We propose here robust server side methodology to detect phishing attacks, called phishGILLNET, which incorporates the power of natural language processing and machine learning techniques. phishGILLNET is a multi-layered approach to detect phishing attacks. The ...

Journal: :CoRR 2012
Ammar Almomani B. B. Gupta Tat Chee Wan Altyeb Altaher Selvakumar Manickam

Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords, credit card number and updating account information or fill billing information. One of the main problems of phishing email detection is the unknown “zero-day” phishing ...

2009
Alessandro Acquisti Lorrie Cranor Jason Hong

As the battle against phishing continues, many questions remain about where stakeholders should place their efforts to achieve effective prevention, speedy detection, and fast action. Do stakeholders have sufficient incentives to act? What should be the top priorities for the anti-phishing community? To provide insights into these questions we conducted 31 in-depth interviews with anti-phishing...

Journal: :Forensic Science International: Digital Investigation 2021

Journal: :Computers & Electrical Engineering 2021

The latest report by Kaspersky on email Spam and targeted Phishing attacks, percentage, highlights the need of an urgent solution. Attachment-driven Spear-phishing struggles to succeed against many providers’ malware-filtration systems, which proactively check emails for malicious software. In this paper, we provided a solution that can detect attacks based required similarities in specific dom...

Journal: :Expert Syst. Appl. 2013
Phoebe A. Barraclough M. Alamgir Hossain M. A. Tahir Graham Sexton Nauman Aslam

Phishing is an instance of social engineering techniques used to deceive users into giving their sensitive information using an illegitimate website that looks and feels exactly like the target organization website. Most phishing detection approaches utilizes Uniform Resource Locator (URL) blacklists or phishing website features combined with machine learning techniques to combat phishing. Desp...

2008
Daisuke Miyamoto Hiroaki Hazeyama Youki Kadobayashi

In this paper, we evaluate the performance of machine learningbased methods for detection of phishing sites. In our previous work [1], we attempted to employ a machine learning technique to improve the detection accuracy. Our preliminary evaluation showed the AdaBoost-based detection method can achieve higher detection accuracy than the traditional detection method. Here, we evaluate the perfor...

2009
Alessandro Acquisti Lorrie Cranor Jason Hong

Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick people into giving up personal information. Victims perceive these emails as associated with a trusted brand, while in reality they are the work of con artists interested in identity theft [57]. These increasingly sophisticated attacks not only spoof email and web sites, but they can also spoof ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید