By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
Tag: Phishing
NLP in Cybersecurity: Analyzing Phishing Emails for Enhanced Protection
By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
Machine Learning and AI in Phishing Detection
By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
Leveraging Logistic Regression for Phishing Threat Identification
By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
Enhancing Phishing Detection Through Multilayer Perceptron in Cybersecurity
By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
Advanced Techniques for Detecting Phishing URLs
By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
Phishing Attack and its Types
By: Arya Brijith, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University,…
Understanding and Preventing Phishing Attacks
By: KUKUTLA TEJONATH REDDY, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia…
The Evolution of Phishing Attacks How Machine Learning Keeps Up
By: Varsha Arya, Asia University, Taiwan In the ever-changing landscape of cybersecurity, one threat has remained…
Advanced Techniques for Detecting Phishing URLs in Emails
By: Anupama Mishra, Swami Rama Himalayan University, Dehradun, India The digital world we inhabit today is…
Botnet Resilience: Enhancing Detection in the Digital Age
By: Akshat Gaurav, Ronin Institute, U.S. In the ever-evolving landscape of cybersecurity, the battle against botnets…
Quantum Fusion: Blazing a Trail in the World of Computation
By: Akshat Gaurav, Ronin Institute, Montclair, USA Quantum computing has long been heralded as the next…
Phishing Attack in Modern World
By: R. S. Pal While the size and sophistication of cybersecurity threats continue to rise, social…
What is Mobile Phishing and How to Detect it?
By: A. Khan, K. T. Chui Smart phones play a significant role in our lives, because…