Results 21 to 30 of about 53,867 (205)

Spear-Phishing Susceptibility Stemming From Personality Traits

open access: yesIEEE Access, 2022
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie   +2 more
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Recognition of genuine and phishing emails may not be associated with response to phishing attacks [PDF]

open access: yesJournal of Universal Computer Science
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious ...
Alex Crgol, Simon Vrhovec
doaj   +3 more sources

The Art of Phishing [PDF]

open access: yes, 2019
Nowadays there are many threats that a company needs to protect itself. Everyone knows someone who has fallen for a coup by using an email, message or phone. People who pass by someone they trust, to extract data and money from the victim. These three ways are used to try convince someone to deliver accounts, credit card and document data in companies ...
Teresa Guarda   +2 more
openaire   +2 more sources

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis [PDF]

open access: yes, 2020
Recently, the development and implementation of phishing attacks require little technical skills and costs. This uprising has led to an ever-growing number of phishing attacks on the World Wide Web.
Chen, Yingke, Opara, Chidimma, Wei, Bo
core   +2 more sources

Scalable Detection and Isolation of Phishing [PDF]

open access: yes, 2009
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core   +2 more sources

High Accuracy Phishing Detection Based on Convolutional Neural Networks [PDF]

open access: yes, 2020
The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber-attacks.
Alzaylaee, Mohammed K.   +1 more
core   +2 more sources

Email Phishing: An Enhanced Classification Model to Detect Malicious URLs [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2019
Phishing is the process of enticing people into visiting fraudulent websites and persuading them to enter their personal information. Number in phishing email are spread with the aim of making web users believe that they are communicating with a trusted ...
Shweta Sankhwar   +2 more
doaj   +1 more source

Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks

open access: yesFuture Internet, 2022
Phishing is a cybercrime that is increasing exponentially day by day. In phishing, a phisher employs social engineering and technology to misdirect victims towards revealing their personal information, which can then be exploited.
Emtethal K. Alamri   +2 more
doaj   +1 more source

Phishing Classification Techniques: A Systematic Literature Review

open access: yesIEEE Access, 2022
Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations.
Rahmad Abdillah   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy