Results 121 to 130 of about 24,070 (256)
Towards Standardized Prevention of Unsolicited Communications and Phishing Attacks
JaeSeung Song, Andreas Künz
openalex +2 more sources
Ethical simulation of a phishing attack
This article presents an ethical simulation of a phishing attack as a research method for analysing users' susceptibility to such threats. The study involved conducting an experiment in which emails mimicking authentic messages from popular services ...
Justyna Kęczkowska +2 more
doaj +1 more source
Implementation Of Defence Schemes For Phishing Attacks On Mobile Devices
Aditya Kharat, Yogesh Komalwad
openalex +1 more source
Fighting email phishing attacks utilizing brand icon (Favicon) : An Empirical Research
Jerry Pullan +2 more
openalex +2 more sources
The rapid advancement of technology has made cybersecurity a crucial industry. One such prominent menace is phishing, which refers to any fraudulent act aimed at collecting personal data like passwords and credit card information under the guise of genuine organizations.Phishing attacks are often performed through electronic email, social media ...
openaire +1 more source
Phishing attacks are a growing threat that has evolved along with technological advancements. Existing detection methods struggle with constantly evolving tactics and “zero-day” attacks that exploit unknown vulnerabilities.
Gabriela Brezeanu +2 more
doaj +1 more source
A Hybrid CNN-Brown-Bear Optimization Framework for Enhanced Detection of URL Phishing Attacks [PDF]
Brij B. Gupta +6 more
openalex +1 more source
USE OF VISUAL CRYPTOGRAPHY TO PREVENT PHISHING ATTACKS IN ONLINE VOTING SYSTEMS
Neeraj Hale +3 more
openalex +1 more source
Multilayer Approach to Defend Phishing Attacks [PDF]
Cynthia Dhinakaran +2 more
openalex +1 more source
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs) [PDF]
Lukáš Halgaš +2 more
openalex +1 more source

