In the past ten years, due to the rapid growth of the Internet, a huge number of cybercrimes have been committed on the Internet. One of the crucial obstacles’ user’s encounters is phishing website’s threat, especially for login credentials and credit card information. According to the statistics, most attackers utilized PayPal (22%), Microsoft (19%), Facebook (15%), eBay (6%), and Amazon (3%) for phishing. Some phishing attempts are designed to get login credentials or infect specific people’s computers. Since the stakes are so high, attackers invest a lot of effort into fooling the chosen victims. The feature selection-based Particle Swarm Optimization (PSO) method is applied in this study to detect phishing websites. Feature engineering ...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Phishing websites refer to an attack where cyber criminals spoof official websites to lure people in...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
In the past ten years, due to the rapid growth of the Internet, a huge number of cybercrimes have be...
In the last few years, the web phishing attacks have been constantly evolving, causing the customers...
Phishing is a social engineering technique that is commonly used to deceive users in an attempt to o...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing is a type of social engineering attack that can affect any company or anyone. This paper ex...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user ’s co...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing websites is one of the security problems on Internet that target the human vulnerabilities ...
Phishing is a very dangerous security threat that affects individuals as well as companies and organ...
Abstract. Phishing – a hotbed of multibillion dollar underground economy – has become an important c...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Phishing websites refer to an attack where cyber criminals spoof official websites to lure people in...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...
In the past ten years, due to the rapid growth of the Internet, a huge number of cybercrimes have be...
In the last few years, the web phishing attacks have been constantly evolving, causing the customers...
Phishing is a social engineering technique that is commonly used to deceive users in an attempt to o...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing is a type of social engineering attack that can affect any company or anyone. This paper ex...
With increasing technology developments, the Internet has become everywhere and accessible by everyo...
Phishing is a cyber-attack which is socially engineered to trick naive online users into revealing s...
Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user ’s co...
Phishing websites are malicious sites which impersonate as legitimate web pages and they aim to reve...
Phishing websites is one of the security problems on Internet that target the human vulnerabilities ...
Phishing is a very dangerous security threat that affects individuals as well as companies and organ...
Abstract. Phishing – a hotbed of multibillion dollar underground economy – has become an important c...
One of the primary worries of security researchers nowadays is the staggering number of phishing att...
Phishing websites refer to an attack where cyber criminals spoof official websites to lure people in...
Phishing is one of the major web social engineering attacks. This has led to demand for a better way...