Search Results - "Phish"

Refine Results
  1. 1

    Types of anti-phishing solutions for phishing attack by Siti Hawa, Apandi, Jamaludin, Sallim, Roslina, Mohd Sidek

    Published 2020
    “…This scenario exposed them to danger in Internet which is phishing attack. In order to solve phishing attack, the anti-phishing solutions are needed. …”
    Get full text
    Get full text
    Get full text
  2. 2

    PhishGuard: Machine learning-powered phishing URL detection by Murad, Saydul Akbar, Rahimi, Nick, Abu Jafar, Md Muzahid

    Published 2023
    “…Phishing is a major threat to internet security, targeting human vulnerabilities instead of software vulnerabilities. …”
    Get full text
    Get full text
    Get full text
  3. 3

    Phishing website detection by Nur Sholihah, Zaini

    Published 2018
    “…This research focuses primarily on web - based phishing detection methods, not email - based detection methods.…”
    Get full text
    Get full text
  4. 4
  5. 5

    PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder by Tan, Choon Lin, Chiew, Kang Leng, Wong, KokSheik, Sze, San Nah

    Published 2016
    “…The proposed phishing detection approach, called PhishWHO, can be divided into three phases. …”
    Get full text
    Get full text
  6. 6
  7. 7
  8. 8

    Utilisation of website logo for phishing detection by Chiew, K.L., Chang, E.H., Sze, S.N., Tiong, W.K.

    Published 2015
    “…In this paper, we propose a phishing detection method to protect Internet users from the phishing attacks. …”
    Get full text
  9. 9

    Phishing Website Detection using Machine Learning by Padmini, Y, Usha, Sree

    Published 2024
    “…Phishing attacks, a prevalent and significant form of cybercrime, involve attackers masquerading as reputable entities to deceive individuals into revealing sensitive details such as usernames, passwords, and credit card information. …”
    Get full text
    Get full text
    Get full text
  10. 10

    Machine learning technique for phishing website detection by Nurul Amira, Mohd Zin, Mohd Faizal, Ab Razak, Ahmad Firdaus, Zainal Abidin, Ernawan, Ferda, Nor Saradatul Akmar, Zulkifli

    “…This research focuses on strategies for detecting phishing attacks. This study apply a machine learning approach to detect a phishing attack. …”
    Get full text
    Get full text
    Get full text
  11. 11

    Phishing detection via identification of website identity by Ee, Hung Chang, Kang, Leng Chiew, San, Nah Sze, Wei, King Tiong

    Published 2013
    “…In this paper, we propose an anti-phishing method to protect Internet users from the phishing attacks. …”
    Get full text
    Get full text
  12. 12

    Email Phishing Detection Model using CNN Model by Gurumurthy, M., Chitra, K

    Published 2024
    “…Phishing is the most common cybercrime tactic that convinces victims to divulge sensitive information, including passwords, account IDs, sensitive bank information, and dates of birth. …”
    Get full text
    Get full text
    Get full text
  13. 13

    Phishing Website Detection Technique Using Machine Learning by Nurul Amira, Mohd Zin

    Published 2022
    “…This research focuses on strategies for detecting phishing attacks through the internet rather than ways for detecting attacks via email.…”
    Get full text
    Get full text
  14. 14

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…This study explains in detail how fuzzy modeling works by using FA for detecting phishing. Phishing is an unsettled security problem that occurs in the world of internet connected computers. …”
    Get full text
    Get full text
  15. 15

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…In this study, phishing attacks have been studied thoroughly. After a study has been made, machine learning method is used to prevent the phishing attack. …”
    Get full text
    Get full text
  16. 16

    Review of the machine learning methods in the classification of phishing attack by Jupin, John Arthur, Sutikno, Tole, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Deris, Stiawan

    Published 2019
    “…The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. …”
    Get full text
    Get full text
  17. 17

    Website detection for phishing attack by using browser extension by Putera Nuriqmar Iskandar, Ahmad Basri

    Published 2018
    “…In this thesis we focus on phishing attack. Phishing is a criminal trap of taking unfortunate casualties individual data by sending them spoofed email encouraging them to visit a produced site page that resembles a genuine one of an authentic organization and requests that the beneficiaries enter individual data, for example, Mastercard number, secret word and so forth. …”
    Get full text
    Get full text
  18. 18

    Phishdentity : Leverage Website Favicon to Offset Phishing Website by Choo, Jeffrey Soon Fatt

    Published 2015
    “…Phishing attack is a cybercrime which will result in severe financial losses to consumers and entrepreneurs. …”
    Get full text
    Get full text
  19. 19

    Phishing Email Detection Technique by using Hybrid Features by Lew, May Form, Kang, Leng Chiew, San, Nah Sze, Wei, King Tiong

    Published 2015
    “…Phishing emails is growing at an alarming rate in this few years. …”
    Get full text
    Get full text
  20. 20

    Comparative analysis of machine learning classifiers for phishing detection by Mohd Faizal, Ab Razak, Mohd Izham, Jaya, Ernawan, Ferda, Ahmad Firdaus, Zainal Abidin, Nugroho, Fajar Agung

    Published 2022
    “…Nevertheless, the rapid increase use of digital platforms has led to a significant growth of Phishing Attacks. Phishing attacks are one of the most common security issues in digital worlds that can affects both individual and organization in keeping their confidential information secure. …”
    Get full text
    Get full text
    Get full text