Background: Phishing is one type of the social engineering techniques to fool users by pretending tobe a trusted person and stealing users personal data. Quite often, Phishing spreads to email services, and browsers are not always able to block Phishing URLs. The problem of Phishing continues to exist and does not decrease, so there are still issues in this problem that need to be addressed. Objectives: The object of research is the method of processing and detecting Phishing URLs. This study is intended to conduct a study to identify the possible assumptions for the method of automating the processing and detection of Phishing URLs, as well as to find out how the efficiency can be improved, and the detection of Phishing URLs, in addition, ...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Abstract: A web service is one of the most important Internet communications software services. Usin...
Abstract—Phishing is the most commonly used social engineering and cyber-attack. Through this attack...
Background: Phishing is one type of the social engineering techniques to fool users by pretending to...
Background: Phishing is one type of the social engineering techniques to fool users by pretending to...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
Phishing websites have proven to be a major security concern. Several cyberattacks risk the confiden...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
Phishing attacks cause a loss of millions of dollars every year. It involves social engineering whic...
The simplest approach to get sensitive information from unwitting people is through a phishing attac...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing is one of the biggest crimes in the world and involves the theft of the user's sensitive da...
Phishing websites is one of the security problems on Internet that target the human vulnerabilities ...
Abstract: Phishing attacks remain a significant threat to internet users worldwide. Cybercriminals o...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Abstract: A web service is one of the most important Internet communications software services. Usin...
Abstract—Phishing is the most commonly used social engineering and cyber-attack. Through this attack...
Background: Phishing is one type of the social engineering techniques to fool users by pretending to...
Background: Phishing is one type of the social engineering techniques to fool users by pretending to...
The objective of paper is to detect phishing URLs using machine learning algorithms. Phishing is a f...
Phishing websites have proven to be a major security concern. Several cyberattacks risk the confiden...
With the development of the Internet, network security has aroused people’s attention. It can be sai...
Phishing attacks cause a loss of millions of dollars every year. It involves social engineering whic...
The simplest approach to get sensitive information from unwitting people is through a phishing attac...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing is one of the biggest crimes in the world and involves the theft of the user's sensitive da...
Phishing websites is one of the security problems on Internet that target the human vulnerabilities ...
Abstract: Phishing attacks remain a significant threat to internet users worldwide. Cybercriminals o...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Abstract: A web service is one of the most important Internet communications software services. Usin...
Abstract—Phishing is the most commonly used social engineering and cyber-attack. Through this attack...