Results 31 to 40 of about 50,838 (183)

The Phishing Master Anti-Phishing Game

open access: yes, 2022
Games are one type of measure developed to raise security awareness. We present the design of a anti-phishing game for public events or for public spaces. We collected feedback on the game and got an impression of individuals' interaction with the game, through a small user study with a convenience sample at a public event.
Dietmann, Heike   +8 more
openaire   +3 more sources

COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic

open access: yesIEEE Access, 2021
Phishing is an online scam where criminals trick users with various strategies, with the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal or organisational Information Technology resources. Multiple studies
Hossein Abroshan   +3 more
doaj   +1 more source

Detecting phishing gangs via taint analysis on the Ethereum blockchain [PDF]

open access: yesBlockchain, 2023
Blockchain technology has created a new cryptocurrency world and attracted a lot of attention. It also attracts scams, for example, phishing scam, a typical fraud, has been found making a notable amount of money in the blockchain ecosystem, which has a ...
Kangrui Huang, Weili Chen, Zibin Zheng
doaj   +1 more source

Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page

open access: yes, 2014
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core   +1 more source

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

Classification of Phishing Email Using Random Forest Machine Learning Technique

open access: yesJournal of Applied Mathematics, 2014
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu   +1 more
doaj   +1 more source

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

open access: yesFuture Internet, 2020
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj   +1 more source

Characterizing Phishing Threats with Natural Language Processing

open access: yes, 2015
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core   +1 more source

International phishing gangs and operation Phish & Chip [PDF]

open access: yesDigital Evidence and Electronic Signature Law Review, 2014
Francesco Cajani provides an insight to the practical problems when dealing with cross-border crime.
openaire   +1 more source

Home - About - Disclaimer - Privacy