Results 61 to 70 of about 52,374 (182)
Survey on Ethereum phishing detection technology
With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high ...
Zhao CAI, Tao JING, Shuang REN
doaj +1 more source
Phishing Techniques in Mobile Devices
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core +1 more source
Personalized Model‐Driven Interventions for Decisions From Experience
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford +6 more
wiley +1 more source
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Spear phishing is a complex targeted attack in which, an attacker harvests information about the victim prior to the attack. This information is then used to create sophisticated, genuine-looking attack vectors, drawing the victim to compromise ...
Dewan, Prateek +2 more
core +1 more source
Abstract Transfusion medicine generates enormous volumes of data across the vein‐to‐vein continuum, spanning donor characteristics, laboratory testing, component manufacturing, logistics and recipient outcomes. The emergence of big data infrastructures, coupled with artificial intelligence (AI), offers a transformative opportunity to harness this ...
Sheharyar Raza +6 more
wiley +1 more source
Phishing suspiciousness in older and younger adults: The role of executive functioning.
Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, with such goals as financial or identity theft.
Brandon E Gavett +5 more
doaj +1 more source
On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López +3 more
wiley +1 more source
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati +2 more
doaj +1 more source
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo +4 more
wiley +1 more source
Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli +3 more
wiley +1 more source

