Journal articles on the topic 'Phishing attack detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Phishing attack detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mohamed, Gori, J. Visumathi, Miroslav Mahdal, Jose Anand, and Muniyandy Elangovan. "An Effective and Secure Mechanism for Phishing Attacks Using a Machine Learning Approach." Processes 10, no. 7 (2022): 1356. http://dx.doi.org/10.3390/pr10071356.
Full textAlsariera, Yazan A., Meshari H. Alanazi, Yahia Said, and Firas Allan. "An Investigation of AI-Based Ensemble Methods for the Detection of Phishing Attacks." Engineering, Technology & Applied Science Research 14, no. 3 (2024): 14266–74. http://dx.doi.org/10.48084/etasr.7267.
Full textNur, Sholihah Zaini, Stiawan Deris, Faizal Ab Razak Mohd, et al. "Phishing detection system using machine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1165–71. https://doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Full textZaini, Nur Sholihah, Deris Stiawan, Mohd Faizal Ab Razak, et al. "Phishing detection system using nachine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1165. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Full textR, Nivyashree. "Phishing Website Detection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem48594.
Full textSoma Niloy Ghosh and Jayesh V Jawade. "Comparative analysis on different phishing website detection techniques." International Journal of Frontiers in Engineering and Technology Research 8, no. 2 (2025): 055–62. https://doi.org/10.53294/ijfetr.2025.8.2.0036.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/nucleus.61.02.1402.
Full textIfthikhar, Nimra, Ahthasham Sajid, Adeel Zafar, Atta Ur Rahman, Rida Malik, and Hamza Razzaq. "A Comprehensive Study on Phishing Attack Detection and Mitigation via Ransomware-as-a-Service (RAAS)." Nucleus 61, no. 2 (2025): 93–100. https://doi.org/10.71330/thenucleus.2024.1402.
Full textPRIPAS, Marian-Iulian. "Phishing Attack – Detection and Removal." International Journal of Information Security and Cybercrime 3, no. 1 (2014): 59–64. http://dx.doi.org/10.19107/ijisc.2014.01.07.
Full textKumar, H. V. Kishan, and Praveen K S. "Phishing Website Detection Using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 1824–26. http://dx.doi.org/10.22214/ijraset.2023.54850.
Full textAslin, Sushmitha R. "Phishing attack detection using gradient boosting." i-manager's Journal on Digital Forensics & Cyber Security 2, no. 1 (2024): 33. http://dx.doi.org/10.26634/jdf.2.1.20840.
Full textAnton, Guda, and Klishch Sergey. "Phishing like the first step to gaining access." System technologies 4, no. 147 (2023): 141–54. http://dx.doi.org/10.34185/1562-9945-4-147-2023-13.
Full textLoh, Peter K. K., Aloysius Z. Y. Lee, and Vivek Balachandran. "Towards a Hybrid Security Framework for Phishing Awareness Education and Defense." Future Internet 16, no. 3 (2024): 86. http://dx.doi.org/10.3390/fi16030086.
Full textAlmuhaideb, Abdullah M., Nida Aslam, Almaha Alabdullatif, et al. "Homoglyph Attack Detection Model Using Machine Learning and Hash Function." Journal of Sensor and Actuator Networks 11, no. 3 (2022): 54. http://dx.doi.org/10.3390/jsan11030054.
Full textThang, Nguyen Manh, Lê Quang Anh, Hứa Song Toàn, and Nguyễn Quốc Trung. "A novel method for detecting URLs phishing using hybrid machine learning algorithm." Journal of Science and Technology on Information security 2, no. 19 (2023): 15–28. http://dx.doi.org/10.54654/isj.v2i19.978.
Full textJain, Ankit Kumar, and B. B. Gupta. "Phishing Detection: Analysis of Visual Similarity Based Approaches." Security and Communication Networks 2017 (2017): 1–20. http://dx.doi.org/10.1155/2017/5421046.
Full textDjaballah, kamel Ahsene, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, and Yassine Ramdane. "A Proposal Phishing Attack Detection System on Twitter." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–27. http://dx.doi.org/10.4018/ijisp.309131.
Full textNoori, Nematullah, Vyenkatesh Bawanthad, Mayur Pakhare, Ramashray Agrawal, and Vinod Kimbahune. "Phishing URL Detection using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3645–48. http://dx.doi.org/10.22214/ijraset.2023.52342.
Full textGupta, Suraj Rakesh. "Review on Phishing Attack Detection using Recurrent Neural Network." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 185–88. http://dx.doi.org/10.22214/ijraset.2021.38756.
Full textGlăvan, Dragoș. "Detection of phishing attacks using the anti-phishing framework." Scientific Bulletin of Naval Academy XXIII, no. 1 (2020): 208–12. http://dx.doi.org/10.21279/1454-864x-20-i1-028.
Full textTsehay, Admassu Assegie. "K-Nearest Neighbor Based URL Identification Model for Phishing Attack Detection." Indian Journal of Artificial Intelligence and Neural Networking (IJAINN) 1, no. 2 (2021): 18–21. https://doi.org/10.54105/ijainn.B1019.041221.
Full textSai, Garikapati Charan, Akula Rishika, Garlapati Dheeraj Reddy, Reddyvari Venkateswara Reddy, and Punyaban Patel. "Phishing Detection: A Multilayer Approach to Scale Down Phishing." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 601–8. http://dx.doi.org/10.22214/ijraset.2024.59828.
Full textButnaru, Andrei, Alexios Mylonas, and Nikolaos Pitropakis. "Towards Lightweight URL-Based Phishing Detection." Future Internet 13, no. 6 (2021): 154. http://dx.doi.org/10.3390/fi13060154.
Full textNthurima, Fredrick, Abraham Mutua, and Waithaka Stephen Titus. "Detecting Phishing Emails Using Random Forest and AdaBoost Classifier Model." Open Journal for Information Technology 6, no. 2 (2023): 123–36. http://dx.doi.org/10.32591/coas.ojit.0602.03123n.
Full textR G, Rahul. "PHISHING - UNVIELLING ITS TECHNIQUES." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34118.
Full textZhou, Liang, Akshat Gaurav, Varsha Arya, Razaz Waheeb Attar, Shavi Bansal, and Ahmed Alhomoud. "Enhancing Phishing Detection in Semantic Web Systems Using Optimized Deep Learning Models." International Journal on Semantic Web and Information Systems 20, no. 1 (2024): 1–13. http://dx.doi.org/10.4018/ijswis.361772.
Full textAssegie, Tsehay Admassu. "K-Nearest Neighbor Based URL Identification Model for Phishing Attack Detection." Indian Journal of Artificial Intelligence and Neural Networking 1, no. 2 (2021): 18–21. http://dx.doi.org/10.35940/ijainn.b1019.041221.
Full textAssegie, Tsehay Admassu. "K-Nearest Neighbor Based URL Identification Model for Phishing Attack Detection." Indian Journal of Artificial Intelligence and Neural Networking 1, no. 2 (2021): 18–21. http://dx.doi.org/10.54105/ijainn.b1019.041221.
Full textMounika, N., G. P. Amrutha, V. Krupavani, CH Kumar Raja, and A. Raj Prakash. "A Proactive Approach for Fake Website Detection Using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43597.
Full textAhammad, Shaik Irshad, Amanchi Kalpana, and Karthikram A. "AntiPhishStack 2.0: A Transformer-Driven Framework for Robust Phishing URL Detection." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 255–60. https://doi.org/10.47001/irjiet/2025.inspire41.
Full textDesai, Viraj, and Kavitha R. "Unveiling the Depths of Phishing: Understanding Tactics, Impacts, and Countermeasures." International Journal of Innovative Research in Science,Engineering and Technology 13, no. 05 (2024): 8596–600. http://dx.doi.org/10.15680/ijirset.2024.1305331.
Full textKim, Bong-Hyun. "Design of Efficient Phishing Detection Model using Machine Learning." Tehnički glasnik 18, no. 1 (2024): 37–42. http://dx.doi.org/10.31803/tg-20230219213151.
Full textJazyah, Yahia Hasan, and Luai Al Shalabi. "Phishing detection using clustering and machine learning." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 4 (2024): 4526. http://dx.doi.org/10.11591/ijai.v13.i4.pp4526-4536.
Full textDadkhah, Mehdi, Shahaboddin Shamshirband, and Ainuddin Wahid Abdul Wahab. "A hybrid approach for phishing web site detection." Electronic Library 34, no. 6 (2016): 927–44. http://dx.doi.org/10.1108/el-07-2015-0132.
Full textMuhammad, Aamir Awan. "Pishing Attacks in Network Security." LC International Journal of STEM 1, no. 1 (2020): 29–33. https://doi.org/10.5281/zenodo.5005226.
Full textAbdulrahman, Lozan Mohammed, Sarkar Hasan Ahmed, Zryan Najat Rashid, Yousif Sufyan Jghef, Teba Mohammed Ghazi, and Umed H. Jader. "Web Phishing Detection Using Web Crawling, Cloud Infrastructure and Deep Learning Framework." Journal of Applied Science and Technology Trends 4, no. 01 (2023): 54–71. http://dx.doi.org/10.38094/jastt401144.
Full textY, Dwarakasai. "LSTM Based Phishing Detection for Big Email Data." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2607–10. https://doi.org/10.22214/ijraset.2025.67874.
Full textGürfidan, Remzi. "INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES." Mühendislik Bilimleri ve Tasarım Dergisi 12, no. 2 (2024): 416–29. http://dx.doi.org/10.21923/jesd.1458955.
Full textAl-Sarem, Mohammed, Faisal Saeed, Zeyad Ghaleb Al-Mekhlafi, et al. "An Optimized Stacking Ensemble Model for Phishing Websites Detection." Electronics 10, no. 11 (2021): 1285. http://dx.doi.org/10.3390/electronics10111285.
Full textAtlam, Hany F., and Olayonu Oluwatimilehin. "Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review." Electronics 12, no. 1 (2022): 42. http://dx.doi.org/10.3390/electronics12010042.
Full textSandhya, S. Dhakane, S. Badgujar Apurva, Bagwan Sohel, and Kudle Bharti. "Detecting Phishing Attack and Spam Email Classification." Detecting Phishing Attack and Spam Email Classification 4, no. 1 (2019): 9–13. https://doi.org/10.5281/zenodo.2602658.
Full textSospeter, Birir Kipchirchir, and Wilfred Odoyo. "AI-Based Phishing Attack Detection And Prevention Using Natural Language Processing (NLP)." IC-ITECHS 5, no. 1 (2024): 597–602. https://doi.org/10.32664/ic-itechs.v5i1.1590.
Full textKaushik, Priyanka, and Saurabh Pratap Singh Rathore. "Deep Learning Multi-Agent Model for Phishing Cyber-attack Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 680–86. http://dx.doi.org/10.17762/ijritcc.v11i9s.7674.
Full textFoozy, Cik Feresa Mohd, Muhammad Amir Izaan Anuar, Andi Maslan, Husaini Aza Mohd Adam, and Hairulnizam Mahdin. "Phishing URLs Detection Using Naives Baiyes, Random Forest and LightGBM Algorithms." International Journal of Data Science 5, no. 1 (2024): 56–63. https://doi.org/10.18517/ijods.5.1.56-63.2024.
Full textMr., Ayan Ghosh, and Basak Rahul. "Phishing Attack Detection for Small Organisations – Using Machine Learning." Journal of Advanced Research in Artificial Intelligence & It's Applications 2, no. 3 (2025): 52–57. https://doi.org/10.5281/zenodo.15449656.
Full textR, Gokul, and Felix M. Philip. "Phishing Detection." YMER Digital 21, no. 06 (2022): 405–12. http://dx.doi.org/10.37896/ymer21.06/39.
Full textRendall, Kieran, Antonia Nisioti, and Alexios Mylonas. "Towards a Multi-Layered Phishing Detection." Sensors 20, no. 16 (2020): 4540. http://dx.doi.org/10.3390/s20164540.
Full textKapan, Sibel, and Efnan Sora Gunal. "Improved Phishing Attack Detection with Machine Learning: A Comprehensive Evaluation of Classifiers and Features." Applied Sciences 13, no. 24 (2023): 13269. http://dx.doi.org/10.3390/app132413269.
Full textDholakia, Neel, and Pragati Agrawal. "Review on Phishing Attack Detection Techniques." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 6, no. 2 (2020): 41–47. http://dx.doi.org/10.33130/ajct.2020v06i02.008.
Full textAl-Hamar, Yuosuf, Hoshang Kolivand, Mostafa Tajdini, Tanzila Saba, and Varatharajan Ramachandran. "Enterprise Credential Spear-phishing attack detection." Computers & Electrical Engineering 94 (September 2021): 107363. http://dx.doi.org/10.1016/j.compeleceng.2021.107363.
Full text