A Review and Proof of Concept for Phishing Scam Detection and Response using Apoptosis
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 6
Abstract
Phishing scam is a well-known fraudulent activity in which victims are tricked to reveal their confidential information especially those related to financial information. There are various phishing schemes such as deceptive phishing, malware based phishing, DNS-based phishing and many more. Therefore in this paper, a systematic review analysis on existing works related with the phishing detection and response techniques together with apoptosis have been further investigated and evaluated. Furthermore, one case study to show the proof of concept how the phishing works is also discussed in this paper. This paper also discusses the challenges and the potential research for future work related with the integration of phishing detection model and response with apoptosis. This research paper also can be used as a reference and guidance for further study on phishing detection and response.
Authors and Affiliations
A Yahaya Lawal Aliyu, Madihah Mohd Saudi, Ismail Abdullah
Help Tetraplegic People by Means of a Computational Neuronal Control System
In the present document we present an Interface called BrainMouse where its main task is to help people with motor disabilities specially tetraplegic or quadriplegic people that they can move the mouse of the computer by...
Sentiment Analysis, Visualization and Classification of Summarized News Articles: A Novel Approach
Due to advancement in technology, enormous amount of data is generated every day. One of the main challenges of large amount of data is user overloaded with huge volume of data. Hence effective methods are highly require...
An agent based approach for simulating complex systems with spatial dynamics application in the land use planning
In this research a new agent based approach for simulating complex systems with spatial dynamics is presented. We propose an architecture based on coupling between two systems: multi-agent systems and geographic informat...
HIDING AN IMAGE INSIDE ANOTHER IMAGE USING VARIABLE-RATE STEGANOGRAPHY
A new algorithm is presented for hiding a secret image in the least significant bits of a cover image. The images used may be color or grayscale images. The number of bits used for hiding changes according to pixel neigh...
A Modified clustering for LEACH algorithm in WSN
Node clustering and data aggregation are popular techniques to reduce energy consumption in large Wireless Sensor Networks (WSN). Cluster based routing is always a hot research area in wireless sensor networks. Classical...