Results 81 to 90 of about 52,374 (182)

Detecting and characterizing lateral phishing at scale [PDF]

open access: yes, 2019
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A   +7 more
core   +2 more sources

One Step Forward, Two Steps Back: Managing Uncertainties in Outcomes, Deliverables, and Means in Behavioral Intervention Development Projects

open access: yesJournal of Operations Management, Volume 72, Issue 1, Page 81-107, January 2026.
ABSTRACT We take an extended perspective on project success that includes post‐project outcomes as well as at‐end and during‐project success. To manage projects accordingly, we conceptualize three corresponding orders of uncertainty (outcomes, deliverables, and means uncertainties).
Philip Cash   +2 more
wiley   +1 more source

Cyber-crime Science = Crime Science + Information Security [PDF]

open access: yes, 2010
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter   +2 more
core   +2 more sources

Secure Authentication via Quantum Physical Unclonable Functions: A Review

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré   +8 more
wiley   +1 more source

Securing the Weakest Link: Exploring Affective States Exploited in Phishing Emails With Large Language Models

open access: yesIEEE Access
Cyberattacks often begin with a phishing email designed to exploit human factors, widely regarded as the weakest link in cybersecurity defences. Although previous research has identified factors that make individuals susceptible to scams and fraud, it is
Faithful Chiagoziem Onwuegbuche   +5 more
doaj   +1 more source

Datasets for phishing websites detection

open access: yesData in Brief, 2020
Phishing stands for a fraudulent process, where an attacker tries to obtain sensitive information from the victim. Usually, these kinds of attacks are done via emails, text messages, or websites.
Grega Vrbančič   +2 more
doaj   +1 more source

DeltaPhish: Detecting Phishing Webpages in Compromised Websites

open access: yes, 2017
The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting.
AY Fu   +17 more
core   +1 more source

PhishED: Automated contextual feedback for reported Phishing [PDF]

open access: yes, 2022
When people receive malicious emails that claim to be from a trusted entity like their bank, they can be frightened and uncertain about how safe it is to ignore or delete the message. The uncertainty is hard on users and it may lead them to engage in unsafe actions like clicking on links ``just to check.'' In this work we look at how to provide quick ...
Jenkins, Adam   +2 more
openaire  

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

open access: yesIEEE Open Journal of the Communications Society
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad   +6 more
doaj   +1 more source

The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem

open access: yes, 2018
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy.
Amann, Johanna   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy