Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks

    Brij B. Gupta1,*, Akshat Gaurav2, Razaz Waheeb Attar3, Varsha Arya4, Shavi Bansal5, Ahmed Alhomoud6, Kwok Tai Chui7

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4853-4874, 2024, DOI:10.32604/cmc.2024.057138 - 19 December 2024

    Abstract Phishing attacks are more than two-decade-old attacks that attackers use to steal passwords related to financial services. After the first reported incident in 1995, its impact keeps on increasing. Also, during COVID-19, due to the increase in digitization, there is an exponential increase in the number of victims of phishing attacks. Many deep learning and machine learning techniques are available to detect phishing attacks. However, most of the techniques did not use efficient optimization techniques. In this context, our proposed model used random forest-based techniques to select the best features, and then the Brown-Bear optimization… More >

  • Open Access

    ARTICLE

    Modelling an Efficient URL Phishing Detection Approach Based on a Dense Network Model

    A. Aldo Tenis*, R. Santhosh

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2625-2641, 2023, DOI:10.32604/csse.2023.036626 - 28 July 2023

    Abstract The social engineering cyber-attack is where culprits mislead the users by getting the login details which provides the information to the evil server called phishing. The deep learning approaches and the machine learning are compared in the proposed system for presenting the methodology that can detect phishing websites via Uniform Resource Locator (URLs) analysis. The legal class is composed of the home pages with no inclusion of login forms in most of the present modern solutions, which deals with the detection of phishing. Contrarily, the URLs in both classes from the login page due, considering… More >

  • Open Access

    ARTICLE

    Machine Learning Techniques for Detecting Phishing URL Attacks

    Diana T. Mosa1,2, Mahmoud Y. Shams3,*, Amr A. Abohany2, El-Sayed M. El-kenawy4, M. Thabet5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422 - 06 February 2023

    Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One… More >

  • Open Access

    ARTICLE

    URL Phishing Detection Using Particle Swarm Optimization and Data Mining

    Saeed M. Alshahrani1, Nayyar Ahmed Khan1,*, Jameel Almalki2, Waleed Al Shehri2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5625-5640, 2022, DOI:10.32604/cmc.2022.030982 - 28 July 2022

    Abstract The continuous destruction and frauds prevailing due to phishing URLs make it an indispensable area for research. Various techniques are adopted in the detection process, including neural networks, machine learning, or hybrid techniques. A novel detection model is proposed that uses data mining with the Particle Swarm Optimization technique (PSO) to increase and empower the method of detecting phishing URLs. Feature selection based on various techniques to identify the phishing candidates from the URL is conducted. In this approach, the features mined from the URL are extracted using data mining rules. The features are selected… More >

Displaying 1-10 on page 1 of 4. Per Page