These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Alawida M; Omolara AE; Abiodun OI; Al-Rajab M J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180 [TBL] [Abstract][Full Text] [Related]
4. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061 [TBL] [Abstract][Full Text] [Related]
5. A comprehensive survey of AI-enabled phishing attacks detection techniques. Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340 [TBL] [Abstract][Full Text] [Related]
6. An intelligent identification and classification system for malicious uniform resource locators (URLs). Abu Al-Haija Q; Al-Fayoumi M Neural Comput Appl; 2023 Apr; ():1-17. PubMed ID: 37362563 [TBL] [Abstract][Full Text] [Related]
7. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Xu T; Singh K; Rajivan P Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509 [TBL] [Abstract][Full Text] [Related]
8. A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators. Aldakheel EA; Zakariah M; Gashgari GA; Almarshad FA; Alzahrani AIA Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177607 [TBL] [Abstract][Full Text] [Related]
9. Improving the phishing website detection using empirical analysis of Function Tree and its variants. Balogun AO; Adewole KS; Raheem MO; Akande ON; Usman-Hamza FE; Mabayoje MA; Akintola AG; Asaju-Gbolagade AW; Jimoh MK; Jimoh RG; Adeyemo VE Heliyon; 2021 Jul; 7(7):e07437. PubMed ID: 34278030 [TBL] [Abstract][Full Text] [Related]
10. An intelligent cyber security phishing detection system using deep learning techniques. Mughaid A; AlZu'bi S; Hnaif A; Taamneh S; Alnajjar A; Elsoud EA Cluster Comput; 2022; 25(6):3819-3828. PubMed ID: 35602317 [TBL] [Abstract][Full Text] [Related]
11. A hybrid DNN-LSTM model for detecting phishing URLs. Ozcan A; Catal C; Donmez E; Senturk B Neural Comput Appl; 2023; 35(7):4957-4973. PubMed ID: 34393380 [TBL] [Abstract][Full Text] [Related]
12. DNS dataset for malicious domains detection. Marques C; Malta S; Magalhães JP Data Brief; 2021 Oct; 38():107342. PubMed ID: 34541265 [TBL] [Abstract][Full Text] [Related]
13. Comparative evaluation of machine learning algorithms for phishing site detection. Almujahid NF; Haq MA; Alshehri M PeerJ Comput Sci; 2024; 10():e2131. PubMed ID: 38983211 [TBL] [Abstract][Full Text] [Related]
14. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556 [TBL] [Abstract][Full Text] [Related]
15. How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society. Carroll F; Adejobi JA; Montasari R SN Comput Sci; 2022; 3(2):170. PubMed ID: 35224514 [TBL] [Abstract][Full Text] [Related]
16. Datasets for phishing websites detection. Vrbančič G; Fister I; Podgorelec V Data Brief; 2020 Dec; 33():106438. PubMed ID: 33195768 [TBL] [Abstract][Full Text] [Related]
17. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354 [No Abstract] [Full Text] [Related]
18. Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis. Nagy N; Aljabri M; Shaahid A; Ahmed AA; Alnasser F; Almakramy L; Alhadab M; Alfaddagh S Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050527 [TBL] [Abstract][Full Text] [Related]
19. Cloud-based email phishing attack using machine and deep learning algorithm. Butt UA; Amin R; Aldabbas H; Mohan S; Alouffi B; Ahmadian A Complex Intell Systems; 2023; 9(3):3043-3070. PubMed ID: 35668732 [TBL] [Abstract][Full Text] [Related]
20. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Alzubaidi A Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]