Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    REVIEW

    Phishing Attacks in Social Engineering: A Review

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah

    Journal of Cyber Security, Vol., , DOI:10.32604/jcs.2023.041095

    Abstract Organisations closed their offices and began working from home online to prevent the spread of the COVID-19 virus. This shift in work culture coincided with increased online use during the same period. As a result, the rate of cybercrime has skyrocketed. This study examines the approaches, techniques, and countermeasures of Social Engineering and phishing in this context. The study discusses recent trends in the existing approaches for identifying phishing assaults. We explore social engineering attacks, categorise them into types, and offer both technical and social solutions for countering phishing attacks which makes this paper different from similar works that mainly… More >

  • Open Access

    ARTICLE

    Seeded Transfer Learning for Enhanced Attack Trace and Effective Deception

    Jalaj Pateria1,*, Laxmi Ahuja1, Subhranil Som2

    Journal of Cyber Security, Vol., , DOI:10.32604/jcs.2023.040186

    Abstract Cyberattacks have reached their peak during COVID-19, and intruders urge to gain the upper hand in the cybersecurity battlefield, even gaining dominance. Now intruders are trying harder to elude behavior analysis techniques, which in turn gets organization security to come for a toss. This phenomenon is even more prevalent in agentless environments (IOT devices, mobile devices), where we do not have any access to edge devices and rely on packet data to predict any attack and its actors. In this paper, we shall be discussing enhancing the accuracy of anomalous behavior detection techniques for efficient threat intelligence and revamping deception… More >

  • Open Access

    ARTICLE

    Discovering the Common Traits of Cybercrimes in Pakistan Using Associative Classification with Ant Colony Optimization

    Abdul Rauf1, Muhammad Asif Khan1,*, Hamid Hussain Awan2, Waseem Shahzad3, Najeeb Ul Husaan4

    Journal of Cyber Security, Vol., , DOI:10.32604/jcs.2022.038791

    Abstract In the modern world, law enforcement authorities are facing challenges due to the advanced technology used by criminals to commit crimes. Criminals follow specific patterns to carry out their crimes, which can be identified using machine learning and swarm intelligence approaches. This article proposes the use of the Ant Colony Optimization algorithm to create an associative classification of crime data, which can reveal potential relationships between different features and crime types. The experiments conducted in this research show that this approach can discover various associations among the features of crime data and the specific patterns that major crime types depend… More >

  • Open Access

    RETRACTION

    Retraction Notice to: An Adaptive BWO Algorithm with RSA for Anomaly Detection in VANETs

    Y. Sarada Devi, M. Roopa

    Journal of Cyber Security, Vol., , pp. 1-1, DOI:10.32604/jcs.2022.040534

    Abstract This article has no abstract. More >

Displaying 1-10 on page 1 of 4. Per Page