Results 171 to 180 of about 53,867 (205)
Some of the next articles are maybe not open access.
Spear Phishing - The New Face of Phishing
SSRN Electronic Journal, 2017Over the last ten years, spear phishing was used mainly by espionage groups sponsored by different world states to delude high-ranking people by deceiving them to disclose specific information precious to the attackers. But recently, their strategy has changed and specialists wondered why they troubled to “spread crypto ransomware or banking trojans to
openaire +1 more source
Phishing in Style: Characterizing Phishing Websites in the Wild
2023 7th Network Traffic Measurement and Analysis Conference (TMA), 2023David Hasselquist +3 more
openaire +1 more source
Phishing Faster: Implementing ChatGPT into Phishing Campaigns
2023Tyson Langford, Bryson Payne
openaire +1 more source
Human Factors in Phishing Attacks: A Systematic Literature Review
ACM Computing Surveys, 2022Giuseppe Desolda +2 more
exaly
SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective
IEEE Communications Surveys and Tutorials, 2020Avisha Das +2 more
exaly
An examination of the effect of recent phishing encounters on phishing susceptibility
Decision Support Systems, 2020Rui Chen, Joana Gaia, H Raghav Rao
exaly
Phishing Detection: A Literature Survey
IEEE Communications Surveys and Tutorials, 2013Youssef Iraqi, Andy Jones
exaly
A Survey of Phishing Email Filtering Techniques
IEEE Communications Surveys and Tutorials, 2013Ammar Almomani +2 more
exaly

