咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 32 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26 篇 工学
    • 15 篇 计算机科学与技术...
    • 11 篇 网络空间安全
    • 5 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 信息与通信工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 航空宇航科学与技...
    • 1 篇 安全科学与工程
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 4 篇 医学
    • 4 篇 临床医学
  • 3 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 32 篇 phishing
  • 5 篇 machine learning
  • 4 篇 网络钓鱼
  • 3 篇 网络欺诈
  • 3 篇 security
  • 2 篇 hackers
  • 2 篇 邮件网关
  • 2 篇 engineering
  • 2 篇 仿冒
  • 2 篇 电子商务
  • 2 篇 malware
  • 2 篇 trust
  • 2 篇 application
  • 2 篇 privacy
  • 2 篇 social
  • 2 篇 mobile
  • 2 篇 decision
  • 2 篇 data mining
  • 2 篇 authentication
  • 2 篇 攻击

机构

  • 2 篇 上海交通大学
  • 1 篇 department of co...
  • 1 篇 the degroote sch...
  • 1 篇 internet enginee...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 school of scienc...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 中国刑警学院
  • 1 篇 集美大学
  • 1 篇 department of co...
  • 1 篇 国家计算机网络应...
  • 1 篇 department of co...
  • 1 篇 华东师范大学
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 college of cyber...
  • 1 篇 the department o...
  • 1 篇 information tech...

作者

  • 2 篇 daisuke miyamoto
  • 2 篇 youki kadobayash...
  • 2 篇 hiroaki hazeyama
  • 2 篇 张振翎
  • 1 篇 lama alhubaidi
  • 1 篇 oju onuoha
  • 1 篇 bahaudin g. mujt...
  • 1 篇 jameel almalki
  • 1 篇 belal amro
  • 1 篇 c. emilin shyni
  • 1 篇 qasem abu al-hai...
  • 1 篇 heba mohsen
  • 1 篇 袁雨飞
  • 1 篇 george r.s.weir
  • 1 篇 olatunde abiona
  • 1 篇 ricardo pinto fe...
  • 1 篇 domingos napolit...
  • 1 篇 姜静静
  • 1 篇 bashayer alharbi
  • 1 篇 dina jibat

语言

  • 20 篇 英文
  • 12 篇 中文
检索条件"主题词=phishing"
32 条 记 录,以下是1-10 订阅
排序:
phishing website prediction using base and ensemble classifier techniques with cross-validation
收藏 引用
Cybersecurity 2023年 第1期6卷 17-39页
作者: Anjaneya Awasthi Noopur Goel Department of Computer Applications VBS Purvanchal UniversityJaunpurUPIndia
Internet or public internetwork has become a vulnerable place nowadays as there are so many threats available for the novice or careless users because there exist many types of tools and techniques being used by notor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
URL phishing Detection Using Particle Swarm Optimization and Data Mining
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 5625-5640页
作者: Saeed M.Alshahrani Nayyar Ahmed Khan Jameel Almalki Waleed Al Shehri College of Computing and IT-Shaqra University Shaqra155572Saudi Arabia Department of Computer Science College of Computer in Al-LeithUmm Al-Qura UniversityMakkahSaudi Arabia
The continuous destruction and frauds prevailing due to phishing URLs make it an indispensable area for *** techniques are adopted in the detection process,including neural networks,machine learning,or hybrid techniqu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hunger Search Optimization with Hybrid Deep Learning Enabled phishing Detection and Classification Model
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 6425-6441页
作者: Hadil Shaiba Jaber S.Alzahrani Majdy M.Eltahir Radwa Marzouk Heba Mohsen Manar Ahmed Hamza Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,*** general,these kinds of cyberattacks are made at users through phone calls,em... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A systematic review:Detecting phishing websites using data mining models
收藏 引用
Intelligent and Converged Networks 2023年 第4期4卷 326-341页
作者: Dina Jibat Sarah Jamjoom Qasem Abu Al-Haija Abdallah Qusef the Department of Business Intelligence Technology Princess Sumaya University for TechnologyAmman 11941Jordan the Department of Cybersecurity Princess Sumaya University for TechnologyAmman 11941Jordan the Department of Software Engineering Princess Sumaya University for TechnologyAmman 11941Jordan
As internet technology use is on the rise globally,phishing constitutes a considerable share of the threats that may attack individuals and organizations,leading to significant losses from personal and confidential in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Preventing phishing Attack on Voting System Using Visual Cryptography
收藏 引用
Journal of Computer and Communications 2022年 第10期10卷 149-161页
作者: Ahood Alotaibi Lama Alhubaidi Alghala Alyami Leena Marghalani Bashayer Alharbi Naya Nagy College of Cybersecurity and Digital Forensics Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia
phishing is one of the most common social engineering attacks that users over the internet fall for. An example is voting systems, and because such systems should be accurate and error free, phishing prevention techni... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论
phishing行为及网络金融机构应对策略的博弈分析(英文)
收藏 引用
电子科技大学学报 2009年 第S1期38卷 37-44页
作者: 刘业政 丁正平 袁雨飞 合肥工业大学管理学院 合肥230009 The Degroote School of Business Mcmaster University Canada
phishing是近年来新出现的一种网络欺诈,是指欺诈者(Phisher)通过大量发送欺骗性垃圾邮件或采用其他的方式,意图引诱疏于防范的网络用户登陆假冒的知名站点,从而窃取个人敏感信息的一种攻击方式。这种欺诈行为给网络用户尤其是网络金融... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
phishing Techniques in Mobile Devices
收藏 引用
Journal of Computer and Communications 2018年 第2期6卷 27-35页
作者: Belal Amro College of Information Technology Hebron University Hebron Palestine
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks rang... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Multi-Classifier Based Prediction Model for phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing
收藏 引用
Circuits and Systems 2016年 第9期7卷 2507-2520页
作者: C. Emilin Shyni S. Sarju S. Swamynathan Department of Information Technology KCG College of Technology Chennai India Department of Computer Science St. Joseph’s College of Engineering and Technology Kerala India Department of Information Science and Technology Anna University Chennai India
phishing is the act of attempting to steal a user’s financial and personal information, such as credit card numbers and passwords by pretending to be a trustworthy participant, during online communication. Attackers ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Artificial Neural Network for Websites Classification with phishing Characteristics
收藏 引用
Social Networking 2018年 第2期7卷 97-109页
作者: Ricardo Pinto Ferreira Andréa Martiniano Domingos Napolitano Marcio Romero Dacyr Dante De Oliveira Gatto Edquel Bueno Prado Farias Renato José Sassi Graduate Program in Informaticsand Knowledge Management Universidade Nove de Julho S&atilde o Paulo Brazil
Several threats are propagated by malicious websites largely classified as phishing. Its function is important information for users with the purpose of criminal practice. In summary, phishing is a technique used on t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Mobile phishing Attacks and Mitigation Techniques
收藏 引用
Journal of Information Security 2015年 第3期6卷 206-212页
作者: Hossain Shahriar Tulin Klintic Victor Clincy Kennesaw State University Marietta Georgia USA
Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for man... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论