Results 171 to 180 of about 53,867 (205)
Some of the next articles are maybe not open access.

To phish, or not to phish…

Network Security, 2017
Karen Renaud, Gareth Renaud
openaire   +1 more source

Spear Phishing - The New Face of Phishing

SSRN Electronic Journal, 2017
Over the last ten years, spear phishing was used mainly by espionage groups sponsored by different world states to delude high-ranking people by deceiving them to disclose specific information precious to the attackers. But recently, their strategy has changed and specialists wondered why they troubled to “spread crypto ransomware or banking trojans to
openaire   +1 more source

Phishing in Style: Characterizing Phishing Websites in the Wild

2023 7th Network Traffic Measurement and Analysis Conference (TMA), 2023
David Hasselquist   +3 more
openaire   +1 more source

Human Factors in Phishing Attacks: A Systematic Literature Review

ACM Computing Surveys, 2022
Giuseppe Desolda   +2 more
exaly  

SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective

IEEE Communications Surveys and Tutorials, 2020
Avisha Das   +2 more
exaly  

An examination of the effect of recent phishing encounters on phishing susceptibility

Decision Support Systems, 2020
Rui Chen, Joana Gaia, H Raghav Rao
exaly  

Phishing Detection: A Literature Survey

IEEE Communications Surveys and Tutorials, 2013
Youssef Iraqi, Andy Jones
exaly  

Phishing Tripz

Journal of Digital Forensic Practice, 2006
openaire   +1 more source

A Survey of Phishing Email Filtering Techniques

IEEE Communications Surveys and Tutorials, 2013
Ammar Almomani   +2 more
exaly  

Home - About - Disclaimer - Privacy