Results 91 to 100 of about 52,374 (182)

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande   +3 more
doaj  

A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]

open access: yes
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni   +4 more
core  

A State-of-the-Art Review on Phishing Website Detection Techniques

open access: yesIEEE Access
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as a primary tool for attackers to deceive users and steal sensitive information.
Wenhao Li   +4 more
doaj   +1 more source

Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]

open access: yes
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core  

A Hybrid Framework for Improved Weighted Quantum Particle Swarm Optimization and Fast Mask Recurrent CNN to Enhance Phishing-URL Prediction Performance

open access: yesInternational Journal of Computational Intelligence Systems
Phishing websites are cybercrimes that aim to collect confidential data, including bank card numbers, bank accounts, and credentials. To detect phishing sites, specialists must extract the elements of the websites and utilize third-party resources.
S. Senthil Kumar   +2 more
doaj   +1 more source

Phishing vulnerability and personality traits: Insights from a systematic review

open access: yesComputers in Human Behavior Reports
Phishing attacks have gained prominence and effectiveness over the years. Although many efforts are devoted to combat them, generic anti-phishing awareness and training campaigns have shown limited success.
Pablo López-Aguilar   +4 more
doaj   +1 more source

Detection of phishing websites based on the improved TrustRank algorithm

open access: yesDianxin kexue, 2018
Anti-phishing methods just generally detect phishing sites based on comparing the similarity of pages features,which could be anti-detected when attackers are clear about the extraction process of features.Therefore,a method based on web pages ...
Hao HAN, Bowen LIU, Guoyuan LIN
doaj   +2 more sources

Can Phishing Education Enable Users To Recognize Phishing Attacks?. [PDF]

open access: yes, 2017
Phishing attacks have increased rapidly and caused many drastic damages and losses for internet users‟ .The purpose of this research is to investigate on effectiveness of phishing education and training to help users identify different forms of phishing threats.
openaire   +2 more sources

Phishing

open access: yes, 2013
This study deals with the criminal scheme known as “Phishing”. In the first part of the study a technical analysis of Phishing serves to identify the operational variants of this scheme and the probable victims of this type of attack; in the second part, the scheme is legally decomposed, wi± the indication of the catalog of criminal offenses underlying
openaire   +1 more source

Home - About - Disclaimer - Privacy