Results 121 to 130 of about 24,070 (256)

Ethical simulation of a phishing attack

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
This article presents an ethical simulation of a phishing attack as a research method for analysing users' susceptibility to such threats. The study involved conducting an experiment in which emails mimicking authentic messages from popular services ...
Justyna Kęczkowska   +2 more
doaj   +1 more source

Phishing Attacks Execution

open access: yesJournal of Information Systems Engineering and Management
The rapid advancement of technology has made cybersecurity a crucial industry. One such prominent menace is phishing, which refers to any fraudulent act aimed at collecting personal data like passwords and credit card information under the guise of genuine organizations.Phishing attacks are often performed through electronic email, social media ...
openaire   +1 more source

Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis

open access: yesIEEE Access
Phishing attacks are a growing threat that has evolved along with technological advancements. Existing detection methods struggle with constantly evolving tactics and “zero-day” attacks that exploit unknown vulnerabilities.
Gabriela Brezeanu   +2 more
doaj   +1 more source

A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks [PDF]

open access: diamond
Brij B. Gupta   +6 more
openalex   +1 more source

USE OF VISUAL CRYPTOGRAPHY TO PREVENT PHISHING ATTACKS IN ONLINE VOTING SYSTEMS

open access: hybrid, 2023
Neeraj Hale   +3 more
openalex   +1 more source

Multilayer Approach to Defend Phishing Attacks [PDF]

open access: green, 2011
Cynthia Dhinakaran   +2 more
openalex   +1 more source

Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs) [PDF]

open access: green, 2020
Lukáš Halgaš   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy