Results 31 to 40 of about 50,838 (183)
The Phishing Master Anti-Phishing Game
Games are one type of measure developed to raise security awareness. We present the design of a anti-phishing game for public events or for public spaces. We collected feedback on the game and got an impression of individuals' interaction with the game, through a small user study with a convenience sample at a public event.
Dietmann, Heike +8 more
openaire +3 more sources
Phishing is an online scam where criminals trick users with various strategies, with the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal or organisational Information Technology resources. Multiple studies
Hossein Abroshan +3 more
doaj +1 more source
Detecting phishing gangs via taint analysis on the Ethereum blockchain [PDF]
Blockchain technology has created a new cryptocurrency world and attracted a lot of attention. It also attracts scams, for example, phishing scam, a typical fraud, has been found making a notable amount of money in the blockchain ecosystem, which has a ...
Kangrui Huang, Weili Chen, Zibin Zheng
doaj +1 more source
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core +1 more source
Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source
Classification of Phishing Email Using Random Forest Machine Learning Technique
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu +1 more
doaj +1 more source
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core +1 more source
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj +1 more source
Characterizing Phishing Threats with Natural Language Processing
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core +1 more source
International phishing gangs and operation Phish & Chip [PDF]
Francesco Cajani provides an insight to the practical problems when dealing with cross-border crime.
openaire +1 more source

