Results 21 to 30 of about 50,838 (183)

Recognition of genuine and phishing emails may not be associated with response to phishing attacks [PDF]

open access: yesJournal of Universal Computer Science
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious ...
Alex Crgol, Simon Vrhovec
doaj   +3 more sources

A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques

open access: yesIEEE Access, 2022
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet economy. Phishing attacks are now most often carried out by email.
Said Salloum   +3 more
doaj   +1 more source

Spear-Phishing Susceptibility Stemming From Personality Traits

open access: yesIEEE Access, 2022
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie   +2 more
doaj   +1 more source

Email Phishing: An Enhanced Classification Model to Detect Malicious URLs [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Phishing is the process of enticing people into visiting fraudulent websites and persuading them to enter their personal information. Number in phishing email are spread with the aim of making web users believe that they are communicating with a trusted ...
Shweta Sankhwar   +2 more
doaj   +1 more source

Phishing Classification Techniques: A Systematic Literature Review

open access: yesIEEE Access, 2022
Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations.
Rahmad Abdillah   +3 more
doaj   +1 more source

Scalable Detection and Isolation of Phishing [PDF]

open access: yes, 2009
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core   +2 more sources

Assessing the role of conceptual knowledge in an anti-phishing game [PDF]

open access: yes, 2014
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to support learning and confidence development in several domains, including the secure use of computers.
Arachchilage, NAG, Ghinea, G, Scott, MJ
core   +1 more source

SPWalk: Similar Property Oriented Feature Learning for Phishing Detection

open access: yesIEEE Access, 2020
Detecting phishing webpages is an essential task that protects legitimate websites and their users from various malicious activities. To classify the suspect webpage as phishing or legitimate, robust and effective features used for classification are in ...
Xiuwen Liu, Jianming Fu
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks

open access: yesFuture Internet, 2022
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited.
Emtethal K. Alamri   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy