Academic literature on the topic 'Phishing attack detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Phishing attack detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Phishing attack detection"
Mohamed, Gori, J. Visumathi, Miroslav Mahdal, Jose Anand, and Muniyandy Elangovan. "An Effective and Secure Mechanism for Phishing Attacks Using a Machine Learning Approach." Processes 10, no. 7 (2022): 1356. http://dx.doi.org/10.3390/pr10071356.
Full textAlsariera, Yazan A., Meshari H. Alanazi, Yahia Said, and Firas Allan. "An Investigation of AI-Based Ensemble Methods for the Detection of Phishing Attacks." Engineering, Technology & Applied Science Research 14, no. 3 (2024): 14266–74. http://dx.doi.org/10.48084/etasr.7267.
Full textNur, Sholihah Zaini, Stiawan Deris, Faizal Ab Razak Mohd, et al. "Phishing detection system using machine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1165–71. https://doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Full textZaini, Nur Sholihah, Deris Stiawan, Mohd Faizal Ab Razak, et al. "Phishing detection system using nachine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1165. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Full textR, Nivyashree. "Phishing Website Detection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48594.
Full textSoma Niloy Ghosh and Jayesh V Jawade. "Comparative analysis on different phishing website detection techniques." International Journal of Frontiers in Engineering and Technology Research 8, no. 2 (2025): 055–62. https://doi.org/10.53294/ijfetr.2025.8.2.0036.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/nucleus.61.02.1402.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/thenucleus.2024.1402.
Full textPRIPAS, Marian-Iulian. "Phishing Attack – Detection and Removal." International Journal of Information Security and Cybercrime 3, no. 1 (2014): 59–64. http://dx.doi.org/10.19107/ijisc.2014.01.07.
Full textKumar, H. V. Kishan, and Praveen K S. "Phishing Website Detection Using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 1824–26. http://dx.doi.org/10.22214/ijraset.2023.54850.
Full textDissertations / Theses on the topic "Phishing attack detection"
Jan, Steve T. K. "Robustifying Machine Learning based Security Applications." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.
Full textMaurer, Max-Emanuel [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Counteracting phishing through HCI : detecting attacks and warning users / Max-Emanuel Maurer. Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2014. http://d-nb.info/1051777089/34.
Full textLikarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.
Full textLin, Ting-Ching, and 林廷璟. "A Method of Detecting Phishing Attacks for Auction Sites." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/23h859.
Full textBook chapters on the topic "Phishing attack detection"
NaliniPriya, G., K. Damoddaram, G. Gopi, and R. Nitish Kumar. "Phishing Attack Detection Using Machine Learning." In Emerging Trends in Expert Applications and Security. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1946-8_27.
Full textNataraj, K. R., D. K. Yashaswini, R. Hema, Nayana S. Pawar, and S. Yashaswi. "Phishing Attack Detection Using Machine Learning." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2058-7_33.
Full textBuber, Ebubekir, Banu Diri, and Ozgur Koray Sahingoz. "NLP Based Phishing Attack Detection from URLs." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76348-4_59.
Full textRastogi, Uttkarsh, Tanu, Vinayak Singhal, Ankush Gupta, and Vimal Kumar. "Detection of Phishing Attack Using Machine Learning." In Advances in Data Science and Computing Technologies. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3656-4_45.
Full textSoni, Jayesh, Surya Sirigineedi, Krishna Sai Vutukuru, S. S. ChandanaEswari Sirigineedi, Nagarajan Prabakar, and Himanshu Upadhyay. "Learning-Based Model for Phishing Attack Detection." In Artificial Intelligence in Cyber Security: Theories and Applications. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-28581-3_11.
Full textSingh, Akhilendra Pratap, Vimal Kumar, Sandeep Singh Sengar, and Manoj Wairiya. "Detection and Prevention of Phishing Attack Using Dynamic Watermarking." In Information Technology and Mobile Communication. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20573-6_21.
Full textYoon, Jun Yong, and Bong Jun Choi. "Privacy-Friendly Phishing Attack Detection Using Personalized Federated Learning." In Intelligent Human Computer Interaction. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27199-1_46.
Full textMcConnell, Benjamin, Daniel Del Monaco, Mahdieh Zabihimayvan, Fatemeh Abdollahzadeh, and Samir Hamada. "Phishing Attack Detection: An Improved Performance Through Ensemble Learning." In Artificial Intelligence and Soft Computing. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-42508-0_14.
Full textChi, Yaping, Zhiting Ling, Xuejing Ba, and Shuhao Li. "An Analysis of a New Detection Method for Spear Phishing Attack." In Lecture Notes in Electrical Engineering. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6508-9_129.
Full textAneesh Kini, U., M. Poornananda Bhat, Raghavendra Ganiga, Radhika M. Pai, M. M. Manohara Pai, and H. C. Shiva Prasad. "Detection and Control of Phishing Attack in Electronic Medical Record Application." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5558-9_82.
Full textConference papers on the topic "Phishing attack detection"
Goyal, Ashtha, Saksham Mittal, Sumit Negi, et al. "Phishing Attack Detection Using MapReduce and Machine Learning." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726226.
Full textKarthick Kumar, M., and N. Sivakumar. "URL Phishing attack Detection using Machine Learning Algorithms." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687804.
Full textGeetha, B., P. Malathi, T. Thirumalaikumari, V. Janakiraman, H. Anwer Basha, and S. Rukmani Devi. "Machine Learning Approaches for Proactive Phishing Attack Detection." In 2024 7th International Conference on Circuit Power and Computing Technologies (ICCPCT). IEEE, 2024. http://dx.doi.org/10.1109/iccpct61902.2024.10672638.
Full textPandey, Shivam, Prashant Priyadarshi, and Suman Devi. "Phishing attack Detection using NLP and Machine learning." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895895.
Full textGopal, S. B., Nanthiya D, Praveenkumar R, et al. "Examination of Phishing Attack Detection Using Machine Learning Techniques." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10723929.
Full textZhumabekova, Aidana, Vladislav Karyukin, Kuanysh Zhumabekova, et al. "The Comprehensive Deep Learning Models for Phishing Attack Detection." In 2024 20th International Asian School-Seminar on Optimization Problems of Complex Systems (OPCS). IEEE, 2024. http://dx.doi.org/10.1109/opcs63516.2024.10720441.
Full textLi, Haiwei, Jiahai Yang, Yuqi Li, and Kun Li. "Email phishing attack detection based on BERT transformer model." In International Conference on Optics, Electronics, and Communication Engineering, edited by Yang Yue. SPIE, 2024. http://dx.doi.org/10.1117/12.3049161.
Full textAlmalkawi, Islam T., Mohammad F. Al-Hammouri, Mohammed Abu Mallouh, and Tasneem Barakat. "Improving Email Security Through Machine Learning-Based Phishing Attack Detection." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847270.
Full textMasmoudi, Salma, Habib M. Kammoun, Maha Charfeddine, and Bechir Hamdaoui. "Phishing Attack Detection Through Recursive Feature Elimination Via Cross Validation." In 2025 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2025. https://doi.org/10.1109/iwcmc65282.2025.11059706.
Full textLobo, Royce, Muhammad Naveed Abbas, and Mamoona Naveed Asghar. "Email Phishing Attack Detection using Recurrent and Feed-forward Neural Networks." In 2023 Cyber Research Conference - Ireland (Cyber-RCI). IEEE, 2023. http://dx.doi.org/10.1109/cyber-rci59474.2023.10671515.
Full text