This paper designs an accurate and low-cost phishing detection sensor by exploring deep learning techniques. Phishing is a very common social engineering technique. The attackers try to deceive online users by mimicking a uniform resource locator (URL) and a webpage. Traditionally, phishing detection is largely based on manual reports from users. Machine learning techniques have recently been introduced for phishing detection. With the recent rapid development of deep learning techniques, many deep-learning-based recognition methods have also been explored to improve classification performance. This paper proposes a light-weight deep learning algorithm to detect the malicious URLs and enable a real-time and energy-saving phishing detection ...
Phishing email is designed to mimics the legitimate emails to fool the victim into revealing their c...
A typical strategy for facilitating unwanted data, like spam, noxious notices, which drive-by weakne...
In terms of the Internet and communication, security is the fundamental challenging aspect. There ar...
\ua9 2019 by the authors. Licensee MDPI, Basel, Switzerland. This paper designs an accurate and low-...
This paper designs an accurate and low-cost phishing detection sensor by exploring deep learning tec...
Phishing detection with high‐performance accuracy and low computational complexity has always been a...
Phishing detection with high-performance accuracy and low computational complexity has always been a...
This work was supported/funded by the Ministry of Higher Education under the Fundamental Research Gr...
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and ...
In the growing world of the internet, the number of ways to obtain crucial data such as passwords an...
This work was supported in part by the Ministry of Higher Education under the Fundamental Research G...
Phishing websites refer to an attack where cyber criminals spoof official websites to lure people in...
Phishers sometimes exploit users’ trust of a known website’s appearance by using a similar page that...
Phishing websites have proven to be a major security concern. Several cyberattacks risk the confiden...
Purpose: Phishing attacks have evolved in recent years due to high-tech-enabled economic growth wor...
Phishing email is designed to mimics the legitimate emails to fool the victim into revealing their c...
A typical strategy for facilitating unwanted data, like spam, noxious notices, which drive-by weakne...
In terms of the Internet and communication, security is the fundamental challenging aspect. There ar...
\ua9 2019 by the authors. Licensee MDPI, Basel, Switzerland. This paper designs an accurate and low-...
This paper designs an accurate and low-cost phishing detection sensor by exploring deep learning tec...
Phishing detection with high‐performance accuracy and low computational complexity has always been a...
Phishing detection with high-performance accuracy and low computational complexity has always been a...
This work was supported/funded by the Ministry of Higher Education under the Fundamental Research Gr...
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and ...
In the growing world of the internet, the number of ways to obtain crucial data such as passwords an...
This work was supported in part by the Ministry of Higher Education under the Fundamental Research G...
Phishing websites refer to an attack where cyber criminals spoof official websites to lure people in...
Phishers sometimes exploit users’ trust of a known website’s appearance by using a similar page that...
Phishing websites have proven to be a major security concern. Several cyberattacks risk the confiden...
Purpose: Phishing attacks have evolved in recent years due to high-tech-enabled economic growth wor...
Phishing email is designed to mimics the legitimate emails to fool the victim into revealing their c...
A typical strategy for facilitating unwanted data, like spam, noxious notices, which drive-by weakne...
In terms of the Internet and communication, security is the fundamental challenging aspect. There ar...