Results 11 to 20 of about 24,070 (256)

A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

open access: yesWasit Journal for Pure Sciences, 2023
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili   +1 more
doaj   +1 more source

Spear-Phishing Susceptibility Stemming From Personality Traits

open access: yesIEEE Access, 2022
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie   +2 more
doaj   +1 more source

A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
A solution to help victims against phishing is anticipating and leveraging impacts related to phisher actions.In this regard, this work reshapes game theoretical logic between Intrusion Detection System (IDS) agents andinsiders to email spear-phishing ...
Franklin Tchakounte   +4 more
doaj   +1 more source

Homoglyph Attack Detection Model Using Machine Learning and Hash Function

open access: yesJournal of Sensor and Actuator Networks, 2022
Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting a spoofing/fake site that appears to be a visual clone of a legitimate site.
Abdullah M. Almuhaideb   +8 more
doaj   +1 more source

Dr. Phish: Phishing Website Detector [PDF]

open access: yesE3S Web of Conferences, 2021
Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data.
Kumar Harish   +4 more
doaj   +1 more source

AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites

open access: yesIEEE Access, 2020
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet.
Yazan Ahmad Alsariera   +3 more
doaj   +1 more source

Phishing Attacks Root Causes [PDF]

open access: yes, 2018
Nowadays, many people are losing considerable wealth due to online scams. Phishing is one of the means that a scammer can use to deceitfully obtain the victim’s personal identification, bank account information, or any other sensitive data. There are a number of anti-phishing techniques and tools in place, but unfortunately phishing still works. One of
Hossein Abroshan   +3 more
openaire   +1 more source

Phishing Classification Techniques: A Systematic Literature Review

open access: yesIEEE Access, 2022
Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations.
Rahmad Abdillah   +3 more
doaj   +1 more source

Investigation into Phishing Risk Behaviour among Healthcare Staff

open access: yesInformation, 2022
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ...
Prosper Kandabongee Yeng   +3 more
doaj   +1 more source

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy