Results 51 to 60 of about 53,867 (205)

Anti-phishing as a web-based user service [PDF]

open access: yes, 2006
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core  

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting

open access: yesSystems Engineering, EarlyView.
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley   +1 more source

Evolutionary Algorithm with Deep Auto Encoder Network Based Website Phishing Detection and Classification

open access: yesApplied Sciences, 2022
Website phishing is a cyberattack that targets online users for stealing their sensitive data containing login credential and banking details. The phishing websites appear very similar to their equivalent legitimate websites for attracting a huge amount ...
Hamed Alqahtani   +7 more
doaj   +1 more source

Detecting and characterizing lateral phishing at scale [PDF]

open access: yes, 2019
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A   +7 more
core   +2 more sources

Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page

open access: yes, 2014
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core   +1 more source

Refining the PoinTER “human firewall” pentesting framework [PDF]

open access: yes, 2019
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core   +3 more sources

DQN‐Guided Subset‐Induced OCSVM Kernel Approximation for Imbalanced Anomaly Detection

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
Anomaly detection under limited normal data remains a fundamental challenge due to severe class imbalance and scarcity of anomalies. We propose a novel framework that reformulates support vector selection in One‐Class SVM as a sequential decision‐making problem.
Wenqian Yu, Jiaying Wu, Jinglu Hu
wiley   +1 more source

Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems [PDF]

open access: yes, 2017
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only.
Barraclough, Phoebe, Fehringer, Gerhard
core   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Home - About - Disclaimer - Privacy