Search

Your search keyword '"phishing"' showing total 28,114 results

Search Constraints

Start Over You searched for: Descriptor "phishing" Remove constraint Descriptor: "phishing"
28,114 results on '"phishing"'

Search Results

1. Lock down your browser: YOU'LL NEED THIS A STABLE INTERNET CONNECTION

2. Why You MUST USE: Don't be afraid of artificial intelligence--it's more useful than you think. Robert Irvine reveals 30 ways that free AI tools can improve everything you do on your PC and online

3. Beat the scammers: Protect yourself with the help of your Mac and iPhone

4. Beat the scammers: Protect yourself with the help of I your Mac and iPhone

7. Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self-protective online behavior related to future cybercrime victimization?

8. Phishing: Gender Differences in Email Security Perceptions and Behaviors.

9. Phishing detection using grey wolf and particle swarm optimizer.

10. Integrating Novel Mechanisms for Threat Detection in Enhanced Data Classification using Ant Colony Optimization with Recurrent Neural Network.

11. Friend or phisher: how known senders and fear of missing out affect young adults' phishing susceptibility on social media.

12. DeepEPhishNet: a deep learning framework for email phishing detection using word embedding algorithms.

13. A comprehensive survey on mobile browser security issues, challenges and solutions.

14. Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm.

16. XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations.

17. URL based phishing attack detection using BiLSTM-gated highway attention block convolutional neural network.

18. Phishing Webpage Detection via Multi-Modal Integration of HTML DOM Graphs and URL Features Based on Graph Convolutional and Transformer Networks.

19. A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective.

20. A novel deep learning model-based optimization algorithm for text message spam detection.

21. A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link.

22. Toward a Hybrid Approach Combining Deep Learning and Case-Based Reasoning for Phishing Email Detection.

23. A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA).

24. Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge.

25. 基于模型堆叠的以太坊钓鱼诈骗账户识别方法.

26. Detection of QR Code-based Cyberattacks using a Lightweight Deep Learning Model.

27. Know their Customers: An Empirical Study of Online Account Enumeration Attacks.

28. X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting.

29. How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control.

30. A machine learning model for predicting phishing websites.

31. Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms

32. Adaptive hybrid learning for advanced phishing detection.

33. Enhanced accuracy performance in detecting phishing website based on neuro fuzzy scheme comparison with support vector machine algorithm.

34. An efficient detection of phishing sites in cloud computing using enhanced convolution neural network compared over linear regression with improved accuracy.

35. A study and survey of chrome extension to detect phishing websites.

36. Email spam detection and filtering using machine learning.

37. Detection of Phishing websites using various machine learning techniques.

38. Phishing website detection using machine learning algorithms.

39. The challenges of cyber space with crime-as-a-service (CAAS) to amateur attackers.

40. The Second-Factor Authentication System at CERN.

41. Integrating the PanDA Workload Management System with the Vera C. Rubin Observatory.

42. PHISHING SUSCEPTIBILITY IN CONTEXT: A MULTILEVEL INFORMATION PROCESSING PERSPECTIVE ON DECEPTION DETECTION.

43. False saviour.

44. ВІДПОВІДАЛЬНІСТЬ ОСОБИ ЗА НЕПРАВОМІРНІ ДІЇ В ІНТЕРНЕТІ: ПРАВОВІ ТА ЕТИЧНІ АСПЕКТИ

45. Situational Contingencies in Susceptibility of Social Media to Phishing: A Temptation and Restraint Model.

46. Carrier Global takes collaborative approach to cybersecurity

47. SAP SE revamps application security scanning using simulation and automation

48. 12 dark web monitoring tools

49. ‘Unusual’ Voldemort cyberespionage attack impersonates tax authorities

50. The Role of AI in Email Security: Beyond Phishing Detection

Catalog

Books, media, physical & digital resources