Results 91 to 100 of about 53,867 (205)
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi +5 more
wiley +1 more source
Cyberattacks often begin with a phishing email designed to exploit human factors, widely regarded as the weakest link in cybersecurity defences. Although previous research has identified factors that make individuals susceptible to scams and fraud, it is
Faithful Chiagoziem Onwuegbuche +5 more
doaj +1 more source
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad +6 more
doaj +1 more source
A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni +4 more
core
POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core
A State-of-the-Art Review on Phishing Website Detection Techniques
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as a primary tool for attackers to deceive users and steal sensitive information.
Wenhao Li +4 more
doaj +1 more source
Phishing as a new information threat: a crime or mischief? [PDF]
Bailov A. Phishing as a new information threat: a crime or mischief? / Bailov Anton, Pinkerton Ron, Wihelm Schwebel // Теоретичні та практичні проблеми реалізації норм права : матеріали ІІ Всеукр. наук.-практ. конф. (з міжнар. участю) (м.
Bailov, A. V. +5 more
core
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande +3 more
doaj
Phishing Codebook: A Structured Framework for the Characterization of Phishing Emails
Phishing is one of the most prevalent and expensive types of cybercrime faced by organizations and individuals worldwide. Most prior research has focused on various technical features and traditional representations of text to characterize phishing emails.
Tarini Saka +3 more
openaire +2 more sources
Detection of phishing websites based on the improved TrustRank algorithm
Anti-phishing methods just generally detect phishing sites based on comparing the similarity of pages features,which could be anti-detected when attackers are clear about the extraction process of features.Therefore,a method based on web pages ...
Hao HAN, Bowen LIU, Guoyuan LIN
doaj +2 more sources

