Follow
Gunikhan Sonowal
Gunikhan Sonowal
Assam down town University
Verified email at adtu.in - Homepage
Title
Cited by
Cited by
Year
PhiDMA–A phishing detection model with multi-filter approach
G Sonowal, KS Kuppusamy
Journal of King Saud University-Computer and Information Sciences 32 (1), 99 …, 2020
1222020
SmiDCA: An Anti-Smishing Model with Machine Learning Approach
G Sonowal, KS Kuppusamy
The Computer Journal 61 (8), 1143–1157, 2018
662018
Phishing email detection based on binary search feature selection
G Sonowal
SN Computer Science 1 (4), 191, 2020
352020
Detecting phishing SMS based on multiple correlation algorithms
G Sonowal
SN computer science 1 (6), 361, 2020
232020
Masphid: a model to assist screen reader users for detecting phishing sites using aural and visual similarity measures
G Sonowal, KS Kuppusamy
Proceedings of the International Conference on Informatics and Analytics, 1-6, 2016
172016
Spear-Phishing Emails Verification Method based on Verifiable Secret Sharing Scheme.
G Sonowal, A Sharma, L Kharb
Journal of Information Assurance & Security 16 (3), 2021
142021
MMSPhiD: A Phoneme based Phishing Verification Model for Persons with Visual Impairments
G Sonowal, KS Kuppusamy
Information & Computer Security 26 (5), 613-636, 2018
142018
Usability evaluation of active anti-phishing browser extensions for persons with visual impairments
G Sonowal, KS Kuppusamy, A Kumar
Advanced Computing and Communication Systems (ICACCS), 2017 4th …, 2017
102017
Phishing and Communication Channels
G Sonowal
220 1, XVII, 2022
7*2022
Introduction to phishing
G Sonowal, G Sonowal
Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022
62022
A model for detecting sounds-alike phishing email contents for persons with visual impairments
G Sonowal
2020 Sixth International Conference on e-Learning (econf), 17-21, 2020
62020
Phishing kits
G Sonowal, G Sonowal
Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022
32022
Communication channels
G Sonowal, G Sonowal
Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022
32022
Types of Phishing
G Sonowal, G Sonowal
Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022
22022
What Does a Phishing URL Look Like?
G Sonowal, G Sonowal
Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022
12022
AMR-XAI-DWT: Age-Related Macular Regenerated Classification using X-AI with Dual Tree CWT
N Kumar, G Sonowal, V Balaji
Fusion: Practice and Applications 15 (2), 17-7-35, 2024
2024
Recent Research Techniques in Processing, Security, and Storage of Real-World Applications of Big Computing
V Balaji, G Sonowal, S Gowda
Big Data Computing: Advances in Technologies, Methodologies, and …, 2024
2024
The Future of Social Engineering Attack
G Sonowal
Social Engineering Attack:: Rethinking Responsibilities and Solutions 1, 219, 2023
2023
Laws governing social engineering attacks
G Sonowal
Social Engineering Attack:: Rethinking Responsibilities and Solutions 1, 198, 2023
2023
Defending against social engineering attacks
G Sonowal
Social Engineering Attack:: Rethinking Responsibilities and Solutions 1, 162, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20