These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

110 related articles for article (PubMed ID: 35668732)

  • 1. Cloud-based email phishing attack using machine and deep learning algorithm.
    Butt UA; Amin R; Aldabbas H; Mohan S; Alouffi B; Ahmadian A
    Complex Intell Systems; 2023; 9(3):3043-3070. PubMed ID: 35668732
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A comprehensive survey of AI-enabled phishing attacks detection techniques.
    Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K
    Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An intelligent cyber security phishing detection system using deep learning techniques.
    Mughaid A; AlZu'bi S; Hnaif A; Taamneh S; Alnajjar A; Elsoud EA
    Cluster Comput; 2022; 25(6):3819-3828. PubMed ID: 35602317
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A hybrid DNN-LSTM model for detecting phishing URLs.
    Ozcan A; Catal C; Donmez E; Senturk B
    Neural Comput Appl; 2023; 35(7):4957-4973. PubMed ID: 34393380
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.
    Aldhyani THH; Alkahtani H
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808184
    [TBL] [Abstract][Full Text] [Related]  

  • 6. So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility.
    Sarno DM; Neider MB
    Hum Factors; 2022 Dec; 64(8):1379-1403. PubMed ID: 33835881
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Evaluation of Federated Learning in Phishing Email Detection.
    Thapa C; Tang JW; Abuadbba A; Gao Y; Camtepe S; Nepal S; Almashor M; Zheng Y
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177549
    [TBL] [Abstract][Full Text] [Related]  

  • 8. How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society.
    Carroll F; Adejobi JA; Montasari R
    SN Comput Sci; 2022; 3(2):170. PubMed ID: 35224514
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis.
    Nagy N; Aljabri M; Shaahid A; Ahmed AA; Alnasser F; Almakramy L; Alhadab M; Alfaddagh S
    Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050527
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Applications of deep learning for phishing detection: a systematic literature review.
    Catal C; Giray G; Tekinerdogan B; Kumar S; Shukla S
    Knowl Inf Syst; 2022; 64(6):1457-1500. PubMed ID: 35645443
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content.
    Lin T; Capecci DE; Ellis DM; Rocha HA; Dommaraju S; Oliveira DS; Ebner NC
    ACM Trans Comput Hum Interact; 2019 Sep; 26(5):. PubMed ID: 32508486
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detecting phishing websites using machine learning technique.
    Dutta AK
    PLoS One; 2021; 16(10):e0258361. PubMed ID: 34634081
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Binary Hunter-Prey Optimization with Machine Learning-Based Cybersecurity Solution on Internet of Things Environment.
    Khadidos AO; AlKubaisy ZM; Khadidos AO; Alyoubi KH; Alshareef AM; Ragab M
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631743
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.
    Rajivan P; Gonzalez C
    Front Psychol; 2018; 9():135. PubMed ID: 29515478
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Datasets for phishing websites detection.
    Vrbančič G; Fister I; Podgorelec V
    Data Brief; 2020 Dec; 33():106438. PubMed ID: 33195768
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking.
    McAlaney J; Hills PJ
    Front Psychol; 2020; 11():1756. PubMed ID: 32849040
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Improving malicious email detection through novel designated deep-learning architectures utilizing entire email.
    Muralidharan T; Nissim N
    Neural Netw; 2023 Jan; 157():257-279. PubMed ID: 36371967
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Phishing Email Detection Based on Binary Search Feature Selection.
    Sonowal G
    SN Comput Sci; 2020; 1(4):191. PubMed ID: 33063047
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Machine learning for email spam filtering: review, approaches and open research problems.
    Dada EG; Bassi JS; Chiroma H; Abdulhamid SM; Adetunmbi AO; Ajibuwa OE
    Heliyon; 2019 Jun; 5(6):e01802. PubMed ID: 31211254
    [TBL] [Abstract][Full Text] [Related]  

  • 20. It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling.
    Kleitman S; Law MKH; Kay J
    PLoS One; 2018; 13(10):e0205089. PubMed ID: 30365492
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.