Results 1 to 10 of about 24,051 (237)

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups

open access: yesIEEE Access, 2021
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee   +4 more
doaj   +3 more sources

E-mail-Based Phishing Attack Taxonomy

open access: yesApplied Sciences, 2020
The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing.
Justinas Rastenis   +5 more
doaj   +3 more sources

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yesCognitive Computation, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Keshav Dahal, Fadi Thabtah
exaly   +2 more sources

Phishing Attacks: A Recent Comprehensive Study and a New Anatomy

open access: yesFrontiers in Computer Science, 2021
With the significant growth of internet usage, people increasingly share their personal information online. As a result, an enormous amount of personal information and financial transactions become vulnerable to cybercriminals.
Zainab Alkhalil   +3 more
doaj   +3 more sources

CERT strategy to deal with phishing attacks

open access: yesComputer Science & Information Technology (CS & IT), 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +2 more sources

Phishing Attack and their Prevention

open access: bronzeINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2022
Abstract— The paper includes comparison and analysis of various hacking attacks and will propose some preventive measures to it, Cyber security is an important field of computer science, which deals with securing data, system and deals with complex data securing algorithms like encryption decryption. Keywords—Cyber security, hacking attacks, encryption,
Shefali Parihar
openalex   +3 more sources

Identification of Phishing Attacks using Machine Learning Algorithm [PDF]

open access: yesE3S Web of Conferences, 2023
Phishing is a particular type of cybercrime that allows criminals to trick people and steal crucial data. The phishing assault has developed into a more complex attack vector since the first instance was published in 1990.
P.M Dinesh   +5 more
doaj   +1 more source

Heuristic machine learning approaches for identifying phishing threats across web and email platforms [PDF]

open access: yesFrontiers in Artificial Intelligence
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat.
Ramprasath Jayaprakash   +8 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy