Kalla et al., 2023 - Google Patents
Phishing detection implementation using databricks and artificial IntelligenceKalla et al., 2023
View PDF- Document ID
- 2495915975216919817
- Author
- Kalla D
- Samaah F
- Kuraku S
- Smith N
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
Phishing is a fraudulent activity that includes tricking people into disclosing personal or financial information by impersonating a legitimate company or individual. The increasingly complex nature of phishing has drawn the attention of criminals, who see it as a profitable …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Perwej et al. | A systematic literature review on the cyber security | |
| Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
| Kathrine et al. | Variants of phishing attacks and their detection techniques | |
| Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
| Mousa et al. | Applying risk analysis for determining threats and countermeasures in workstation domain | |
| Osuagwu et al. | Mitigating social engineering for improved cybersecurity | |
| Kaur et al. | Cybersecurity threats in FinTech | |
| Altwairqi et al. | Four most famous cyber attacks for financial gains | |
| Alghenaim et al. | Phishing attack types and mitigation: A survey | |
| Kothamasu et al. | An Investigation on Vulnerability Analysis of Phishing Attacks and Countermeasures. | |
| Karie et al. | Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats | |
| Guvçi et al. | An improved protection approach for protecting from ransomware attacks | |
| Hossain et al. | Classifying cyberattacks on financial organizations based on publicly available deep web dataset | |
| Gupta et al. | A CANVASS on cyber security attacks and countermeasures | |
| Fadli et al. | Cyber attack awareness and prevention in network security | |
| Awan et al. | A user friendly security framework for the protection of confidential information | |
| Calder | Cyber Security: Essential principles to secure your organisation | |
| Teichmann et al. | Phishing attacks: risks and challenges for law firms | |
| Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
| Abid | An Analysis of Phishing Attacks: Information Technology Security: Cybercrime and Its Solutions | |
| Muhammad et al. | Information protection of end users on the web: privacy issues and measures | |
| Adeel et al. | Measuring the implications of email viruses through a unified model of cyber security | |
| Vakil et al. | Cyber Attacks: Detection and Prevention | |
| Al Qwaid | Cybersecurity Threats: Ransomware, Phishing, and Social Engineering | |
| Algabri | AI and Cybersecurity-Innovations in Threat Detection and Prevention |