2020
DOI: 10.14704/web/v17i2/web17049
|View full text |Cite
|
Sign up to set email alerts
|

Detecting the Phishing Attack Using Collaborative Approach and Secure Login through Dynamic Virtual Passwords

Abstract: User data protection is a major problem in the technical world. To get critical data from people such as bank account, credit card details and passwords, fraudulent people use different techniques for their advantages. Misuse of user credentials affects many industry sectors day by day. The fraudulent practice where more people connected to a network revealing sensitive data of individual, group or a company of legitimate sources called phishing. The aids for the hackers are forged websites and emails which lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…A = {bi€Rn} (7) where bj is the bias threshold of the j-th visible cell. Consider that the visible and hidden layers follow Bernoulli distribution; then, the order of (v,h) is represented as shown inEquation ( 8):…”
Section: Deep Q-learning-based Scheduling and Data Transmissionmentioning
confidence: 99%
See 1 more Smart Citation
“…A = {bi€Rn} (7) where bj is the bias threshold of the j-th visible cell. Consider that the visible and hidden layers follow Bernoulli distribution; then, the order of (v,h) is represented as shown inEquation ( 8):…”
Section: Deep Q-learning-based Scheduling and Data Transmissionmentioning
confidence: 99%
“…The application layer combines the sources of medical data and offers medical services that satisfy the needs of the user on the basis of the current situation and demand. Privacy and security information related to patients isthe most essential concept in an IoT-based environment [7]. Data security can be achieved by securely storing and transferring data, ensuring integrity, authenticity, and validity.…”
Section: Introductionmentioning
confidence: 99%
“…The evaluation of the belongings of SSSC type regulator is verified when it is presented to an symmetrical fault on transmission line (Kanaga, 2021). A partial request corresponding regulator type UPFC is examined to moist out sub concurrent movements in generator shaft owing to SSR Rahim, 2020;Ranjeeth, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…The counterfeit website looks similar to the original, so the user submits his login details freely. Suitable antiphishing software [37,38] is a good countermeasure. It can detect suspicious emails and also has a database of suspected websites.…”
mentioning
confidence: 99%