Results 21 to 30 of about 50,838 (183)
Recognition of genuine and phishing emails may not be associated with response to phishing attacks [PDF]
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious ...
Alex Crgol, Simon Vrhovec
doaj +3 more sources
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet economy. Phishing attacks are now most often carried out by email.
Said Salloum +3 more
doaj +1 more source
Spear-Phishing Susceptibility Stemming From Personality Traits
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie +2 more
doaj +1 more source
Email Phishing: An Enhanced Classification Model to Detect Malicious URLs [PDF]
Phishing is the process of enticing people into visiting fraudulent websites and persuading them to enter their personal information. Number in phishing email are spread with the aim of making web users believe that they are communicating with a trusted ...
Shweta Sankhwar +2 more
doaj +1 more source
Phishing Classification Techniques: A Systematic Literature Review
Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations.
Rahmad Abdillah +3 more
doaj +1 more source
Scalable Detection and Isolation of Phishing [PDF]
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core +2 more sources
Assessing the role of conceptual knowledge in an anti-phishing game [PDF]
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to support learning and confidence development in several domains, including the secure use of computers.
Arachchilage, NAG, Ghinea, G, Scott, MJ
core +1 more source
SPWalk: Similar Property Oriented Feature Learning for Phishing Detection
Detecting phishing webpages is an essential task that protects legitimate websites and their users from various malicious activities. To classify the suspect webpage as phishing or legitimate, robust and effective features used for classification are in ...
Xiuwen Liu, Jianming Fu
doaj +1 more source
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited.
Emtethal K. Alamri +2 more
doaj +1 more source

