Cajes
ViewHTML| Publication | Publication Date | Title |
|---|---|---|
| Jain et al. | A survey of phishing attack techniques, defence mechanisms and open research challenges | |
| US9060017B2 (en) | System for detecting, analyzing, and controlling infiltration of computer and network systems | |
| US8356001B2 (en) | Systems and methods for application-level security | |
| Neupane et al. | Impacts and risk of generative AI technology on cyber defense | |
| Veprytska et al. | AI powered attacks against AI powered protection: classification, scenarios and risk analysis | |
| Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
| Sathya et al. | Reinforcing cyber world security with deep learning approaches | |
| Pandhurnekar et al. | Proposed method for threat detection using user behavior analysis | |
| Abubaker et al. | Social engineering in social network: a systematic literature review | |
| Munir et al. | Detection, mitigation and quantitative security risk assessment of invisible attacks at enterprise network | |
| Butkar et al. | Crime Risk Forecasting using Cyber Security and Artificial Intelligent | |
| Rahaman | The Anatomy of a Smishing Attack: Common Techniques and Tactics Used by Cybercriminals | |
| Hu et al. | A Novel Attack‐and‐Defense Signaling Game for Optimal Deceptive Defense Strategy Choice | |
| Khansadurai et al. | Crime Rate Prediction using Cyber Security and Artificial Intelligent | |
| Cajes | The Future of IoT Security: Defending Against DDoS Attack | |
| Wang | Mitigating phishing threats | |
| Kissoon et al. | An Analysis of Key Tools for Detecting Cross-Site Scripting Attacks on Web-Based Systems | |
| Arya | The Evolution of Phishing Attacks How Machine Learning Keeps Up | |
| Raghvin et al. | Trust factor validation for distributed denial of service attack detection using machine learning | |
| Kiriakidis et al. | Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach | |
| Roy et al. | Real-time XSS Vulnerability Detection | |
| Khan et al. | What is Mobile Phishing and How to Detect it | |
| Chuenchujit | A taxonomy of phishing research | |
| Wan | Protecting web contents against persistent crawlers | |
| Sait et al. | A Survey on Techniques to Detect Malicious Activites on Web |