Phishing attacks are security attacks that do not affect only individuals’ or organizations’ websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an exposed environment for such attacks. Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users. Machine and deep learning and other methods were used to design detection methods for these attacks. However, there is still a need to enhance detection accuracy. Optimization of an ensemble classification method for phishing website (PW) detection is proposed in this study. A Genetic Algorithm (GA) was used for the proposed method optimization by tuning several ensemble Machine Learning (ML) methods parameters, in...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
Recently, there have been cases of phishing attempts to steal personal information through fake site...
Phishing activities remain a persistent security threat, with global losses exceeding 2.7 billion US...
In this paper, we propose the use of Ensemble Machine Learning Methods such as Random Forest Algorit...
Solutions to threats posed by technical and social vulnerabilities must be found to secure the web i...
Phishing attacks have become one of the most attacks facing internet users, especially after the COV...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
Due to the popularity of the easiest way to obtain personal information among attackers, phishing de...
Phishing attacks remain a significant threat to internet users globally, leading to substantial fina...
Phishing websites refer to an attack where cyber criminals spoof official websites to lure people in...
Phishing attacks continue to pose a significant threat in today's digital landscape, with both indiv...
Phishing is a type of social engineering attack that can affect any company or anyone. This paper ex...
The continuous development of network technologies plays a major role in increasing the utilization ...
Phishing is typically deployed as an attack vector in the initial stages of a hacking endeavour. Due...
In the Internet of Things arena, smart gadgets are employed to offer quick and dependable access to ...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
Recently, there have been cases of phishing attempts to steal personal information through fake site...
Phishing activities remain a persistent security threat, with global losses exceeding 2.7 billion US...
In this paper, we propose the use of Ensemble Machine Learning Methods such as Random Forest Algorit...
Solutions to threats posed by technical and social vulnerabilities must be found to secure the web i...
Phishing attacks have become one of the most attacks facing internet users, especially after the COV...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
Due to the popularity of the easiest way to obtain personal information among attackers, phishing de...
Phishing attacks remain a significant threat to internet users globally, leading to substantial fina...
Phishing websites refer to an attack where cyber criminals spoof official websites to lure people in...
Phishing attacks continue to pose a significant threat in today's digital landscape, with both indiv...
Phishing is a type of social engineering attack that can affect any company or anyone. This paper ex...
The continuous development of network technologies plays a major role in increasing the utilization ...
Phishing is typically deployed as an attack vector in the initial stages of a hacking endeavour. Due...
In the Internet of Things arena, smart gadgets are employed to offer quick and dependable access to ...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
Recently, there have been cases of phishing attempts to steal personal information through fake site...
Phishing activities remain a persistent security threat, with global losses exceeding 2.7 billion US...