PhiDMA–A phishing detection model with multi-filter approach G Sonowal, KS Kuppusamy Journal of King Saud University-Computer and Information Sciences 32 (1), 99 …, 2020 | 122 | 2020 |
SmiDCA: An Anti-Smishing Model with Machine Learning Approach G Sonowal, KS Kuppusamy The Computer Journal 61 (8), 1143–1157, 2018 | 66 | 2018 |
Phishing email detection based on binary search feature selection G Sonowal SN Computer Science 1 (4), 191, 2020 | 35 | 2020 |
Detecting phishing SMS based on multiple correlation algorithms G Sonowal SN computer science 1 (6), 361, 2020 | 23 | 2020 |
Masphid: a model to assist screen reader users for detecting phishing sites using aural and visual similarity measures G Sonowal, KS Kuppusamy Proceedings of the International Conference on Informatics and Analytics, 1-6, 2016 | 17 | 2016 |
Spear-Phishing Emails Verification Method based on Verifiable Secret Sharing Scheme. G Sonowal, A Sharma, L Kharb Journal of Information Assurance & Security 16 (3), 2021 | 14 | 2021 |
MMSPhiD: A Phoneme based Phishing Verification Model for Persons with Visual Impairments G Sonowal, KS Kuppusamy Information & Computer Security 26 (5), 613-636, 2018 | 14 | 2018 |
Usability evaluation of active anti-phishing browser extensions for persons with visual impairments G Sonowal, KS Kuppusamy, A Kumar Advanced Computing and Communication Systems (ICACCS), 2017 4th …, 2017 | 10 | 2017 |
Phishing and Communication Channels G Sonowal 220 1, XVII, 2022 | 7* | 2022 |
Introduction to phishing G Sonowal, G Sonowal Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022 | 6 | 2022 |
A model for detecting sounds-alike phishing email contents for persons with visual impairments G Sonowal 2020 Sixth International Conference on e-Learning (econf), 17-21, 2020 | 6 | 2020 |
Phishing kits G Sonowal, G Sonowal Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022 | 3 | 2022 |
Communication channels G Sonowal, G Sonowal Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022 | 3 | 2022 |
Types of Phishing G Sonowal, G Sonowal Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022 | 2 | 2022 |
What Does a Phishing URL Look Like? G Sonowal, G Sonowal Phishing and Communication Channels: A Guide to Identifying and Mitigating …, 2022 | 1 | 2022 |
AMR-XAI-DWT: Age-Related Macular Regenerated Classification using X-AI with Dual Tree CWT N Kumar, G Sonowal, V Balaji Fusion: Practice and Applications 15 (2), 17-7-35, 2024 | | 2024 |
Recent Research Techniques in Processing, Security, and Storage of Real-World Applications of Big Computing V Balaji, G Sonowal, S Gowda Big Data Computing: Advances in Technologies, Methodologies, and …, 2024 | | 2024 |
The Future of Social Engineering Attack G Sonowal Social Engineering Attack:: Rethinking Responsibilities and Solutions 1, 219, 2023 | | 2023 |
Laws governing social engineering attacks G Sonowal Social Engineering Attack:: Rethinking Responsibilities and Solutions 1, 198, 2023 | | 2023 |
Defending against social engineering attacks G Sonowal Social Engineering Attack:: Rethinking Responsibilities and Solutions 1, 162, 2023 | | 2023 |