Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
90
Downloads
584
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
56
Downloads
299
Views
Citations
Effectiveness of Deep Learning Algorithms in Phishing Attack Detection for Cybersecurity Frameworks
(Articles)
Mitra Penmetsa
,
Jayakeshav Reddy Bhumireddy
,
Rajiv Chalasani
,
Srikanth Reddy Vangala
,
Ram Mohan Polam
,
Bhavana Kamarthapu
Journal of Data Analysis and Information Processing
Vol.13 No.3
,August 28, 2025
DOI:
10.4236/jdaip.2025.133021
27
Downloads
142
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,137
Downloads
6,382
Views
Citations
HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
Journal of Intelligent Learning Systems and Applications
Vol.2 No.4
,December 14, 2010
DOI:
10.4236/jilsa.2010.24022
5,294
Downloads
10,065
Views
Citations
Mobile Phishing Attacks and Mitigation Techniques
(Articles)
Hossain Shahriar
,
Tulin Klintic
,
Victor Clincy
Journal of Information Security
Vol.6 No.3
,June 30, 2015
DOI:
10.4236/jis.2015.63021
9,641
Downloads
13,981
Views
Citations
Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects
(Articles)
Ali M. A. Abuagoub
Advances in Internet of Things
Vol.14 No.4
,October 14, 2024
DOI:
10.4236/ait.2024.144005
156
Downloads
924
Views
Citations
Social Engineering Threat and Defense: A Literature Survey
(Articles)
Islam Abdalla Mohamed Abass
Journal of Information Security
Vol.9 No.4
,September 18, 2018
DOI:
10.4236/jis.2018.94018
4,882
Downloads
11,023
Views
Citations
MyCloudBills Pen Test and Network Security Assessment
(Articles)
Marcello D’Angelone
Open Access Library Journal
Vol.12 No.8
,August 28, 2025
DOI:
10.4236/oalib.1113973
15
Downloads
132
Views
Citations
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
(Articles)
Eloi De Chérisey
,
Sylvain Guilley
,
Olivier Rioul
,
Darshana Jayasinghe
Journal of Information Security
Vol.12 No.1
,December 10, 2020
DOI:
10.4236/jis.2021.121001
477
Downloads
1,171
Views
Citations
A Comparative Analysis of Tools for Verification of Security Protocols
(Articles)
Nitish Dalal
,
Jenny Shah
,
Khushboo Hisaria
,
Devesh Jinwala
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310104
8,024
Downloads
16,626
Views
Citations
A One-Session Treatment Protocol for Panic Attacks
(Articles)
Ron Robbins
,
Jan Parker
,
Charles Tatum
Psychology
Vol.6 No.9
,July 6, 2015
DOI:
10.4236/psych.2015.69103
4,537
Downloads
8,038
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
,December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,159
Downloads
4,382
Views
Citations
A Study of Social Engineering in Online Frauds
(Articles)
Brandon Atkins
,
Wilson Huang
Open Journal of Social Sciences
Vol.1 No.3
,August 30, 2013
DOI:
10.4236/jss.2013.13004
17,039
Downloads
31,853
Views
Citations
Systematic Review on Social Engineering: Hacking by Manipulating Humans
(Articles)
Chandra Sekhar Bhusal
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121005
1,540
Downloads
7,875
Views
Citations
Operational Sustainability and Digital Leadership for Cybercrime Prevention
(Articles)
Bahaudin G. Mujtaba
International Journal of Internet and Distributed Systems
Vol.5 No.2
,October 13, 2023
DOI:
10.4236/ijids.2023.52002
318
Downloads
1,416
Views
Citations
Development of Two-Factor Authentication to Mitigate Phishing Attack
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.11
,November 6, 2024
DOI:
10.4236/jsea.2024.1711043
145
Downloads
858
Views
Citations
A Comparative Study of Ensemble Learning Techniques and Classification Models to Identify Phishing Websites
(Articles)
Alvina T. Budoen
,
Mingwu Zhang
,
Laban Zephaniah Edwards Jr.
Open Access Library Journal
Vol.12 No.6
,June 5, 2025
DOI:
10.4236/oalib.1113566
51
Downloads
355
Views
Citations
Preventing Phishing Attacks Using Advanced Deep Learning Techniques for Cyber Threat Mitigation
(Articles)
Mukund Sai Vikram Tyagadurgam
,
Venkataswamy Naidu Gangineni
,
Sriram Pabbineedi
,
Ajay Babu Kakani
,
Sri Krishna Kireeti Nandiraju
,
Sandeep Kumar Chundru
Journal of Data Analysis and Information Processing
Vol.13 No.3
,August 28, 2025
DOI:
10.4236/jdaip.2025.133020
29
Downloads
147
Views
Citations
A Secure DHCP Protocol to Mitigate LAN Attacks
(Articles)
Osama S. Younes
Journal of Computer and Communications
Vol.4 No.1
,January 28, 2016
DOI:
10.4236/jcc.2016.41005
6,211
Downloads
12,659
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top