Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/28175
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dauda I, I. A. | - |
dc.contributor.author | Abdullahi, I. M. | - |
dc.contributor.author | Nuhu, B. K. | - |
dc.contributor.author | Ahmed, A. | - |
dc.contributor.author | Jeremiah, I. | - |
dc.date.accessioned | 2024-05-08T11:57:19Z | - |
dc.date.available | 2024-05-08T11:57:19Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | I. A. Dauda, I. M. Abdullahi, Nuhu B. K., A. Ahmed, I. Jeremiah, “A User Oriented, Flexible Real-Time Motion Triggered Surveillance System for Highly Restricted Areas,” 1st International Computing and Communication Conference (I3C) 2024 | en_US |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/28175 | - |
dc.description.abstract | Phishing remains a significant social engineering tool exploited by hackers, especially with the increasing adoption of internet technology leading to a surge in attacks. This systematic literature review explores techniques aimed at detecting and preventing spear phishing attacks. Analyzing 106 papers using the PRISMA framework revealed a high accuracy range of 88% to 99.4% achieved by researchers. However, it was noted that datasets for spear phishing detection are limited, and there's an underutilization of hybrid machine learning approaches. Therefore, future research should focus on exploring and combining various machine learning algorithms to enhance detection and prevention capabilities. | en_US |
dc.language.iso | en | en_US |
dc.subject | Phishing, Spear Phishing, Machine learning. | en_US |
dc.title | A User Oriented, Flexible Real-Time Motion Triggered Surveillance System for Highly Restricted Areas | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
I3C2024_Book_of_Abtracts_123852.pdf | CP19 | 630.92 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.