首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
无线电   1篇
一般工业技术   1篇
自动化技术   5篇
  2021年   1篇
  2019年   2篇
  2017年   1篇
  2015年   1篇
  2013年   1篇
  2012年   1篇
排序方式: 共有7条查询结果,搜索用时 0 毫秒
1
1.

In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.

  相似文献   
2.
3.
4.
5.
Pattern Analysis and Applications - The visual exploration of retinal blood vessels assists ophthalmologists in the diagnoses of different abnormalities of the eyes such as diabetic retinopathy,...  相似文献   
6.
7.
A key challenge for the protection of heterogeneous wireless sensor networks (HWSNs) is how to enable sensor nodes to establish shared cryptographic keys in an authentic and resource-efficient manner for their secure communications. So far, a number of schemes have been developed to address this challenge. However, a main shortcoming of these schemes is that their use of sensor resources is not properly balanced. This has motivated us to propose a new lightweight scheme to rectify the problem. The scheme only employs symmetric cryptosystems for its design. It takes advantage of the hierarchical clustering feature of a HWSN to deliver a novel way of building vertical key shareability before sensor deployment to enable horizontal key shareability after the deployment for authentic shared key establishment. The scheme evaluation shows that it offers strong authenticity and resilience against various security threats, and is more resource-efficient, flexible and scalable than related work.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号