This work was supported in part by the Ministry of Higher Education under the Fundamental Research Grant Scheme under Grant FRGS/1/2018/ICT04/UTM/01/1; and in part by the Faculty of Informatics and Management, University of Hradec Kralove, through SPEV project under Grant 2102/2022.Phishing has become an increasing concern and captured the attention of end-users as well as security experts. Existing phishing detection techniques still suffer from the de ciency in performance accuracy and inability to detect unknown attacks despite decades of development and improvement. Motivated to solve these problems, many researchers in the cybersecurity domain have shifted their attention to phishing detection that capitalizes on machine learning t...
Phishers sometimes exploit users’ trust of a known website’s appearance by using a similar page that...
Phishing attacks plays are a vital role in Stealing users' Personal information for fraudulent activ...
In terms of the Internet and communication, security is the fundamental challenging aspect. There ar...
This work was supported/funded by the Ministry of Higher Education under the Fundamental Research Gr...
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and ...
Phishing detection with high-performance accuracy and low computational complexity has always been a...
Phishing detection with high‐performance accuracy and low computational complexity has always been a...
Phishing email is designed to mimics the legitimate emails to fool the victim into revealing their c...
In the modern world, electronic communication is defined as the most used technologyfor exchanging m...
Phishing is a social engineering cyber attack to steal personal information from users. Attackers so...
\ua9 2019 by the authors. Licensee MDPI, Basel, Switzerland. This paper designs an accurate and low-...
This paper designs an accurate and low-cost phishing detection sensor by exploring deep learning tec...
Purpose: Phishing attacks have evolved in recent years due to high-tech-enabled economic growth wor...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
According to the international body Anti-Phishing Work Group (APWG), phishing activities have skyroc...
Phishers sometimes exploit users’ trust of a known website’s appearance by using a similar page that...
Phishing attacks plays are a vital role in Stealing users' Personal information for fraudulent activ...
In terms of the Internet and communication, security is the fundamental challenging aspect. There ar...
This work was supported/funded by the Ministry of Higher Education under the Fundamental Research Gr...
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and ...
Phishing detection with high-performance accuracy and low computational complexity has always been a...
Phishing detection with high‐performance accuracy and low computational complexity has always been a...
Phishing email is designed to mimics the legitimate emails to fool the victim into revealing their c...
In the modern world, electronic communication is defined as the most used technologyfor exchanging m...
Phishing is a social engineering cyber attack to steal personal information from users. Attackers so...
\ua9 2019 by the authors. Licensee MDPI, Basel, Switzerland. This paper designs an accurate and low-...
This paper designs an accurate and low-cost phishing detection sensor by exploring deep learning tec...
Purpose: Phishing attacks have evolved in recent years due to high-tech-enabled economic growth wor...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
According to the international body Anti-Phishing Work Group (APWG), phishing activities have skyroc...
Phishers sometimes exploit users’ trust of a known website’s appearance by using a similar page that...
Phishing attacks plays are a vital role in Stealing users' Personal information for fraudulent activ...
In terms of the Internet and communication, security is the fundamental challenging aspect. There ar...