Results 11 to 20 of about 24,070 (256)
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili +1 more
doaj +1 more source
Spear-Phishing Susceptibility Stemming From Personality Traits
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie +2 more
doaj +1 more source
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies [PDF]
A solution to help victims against phishing is anticipating and leveraging impacts related to phisher actions.In this regard, this work reshapes game theoretical logic between Intrusion Detection System (IDS) agents andinsiders to email spear-phishing ...
Franklin Tchakounte +4 more
doaj +1 more source
Homoglyph Attack Detection Model Using Machine Learning and Hash Function
Phishing is still a major security threat in cyberspace. In phishing, attackers steal critical information from victims by presenting a spoofing/fake site that appears to be a visual clone of a legitimate site.
Abdullah M. Almuhaideb +8 more
doaj +1 more source
Dr. Phish: Phishing Website Detector [PDF]
Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data.
Kumar Harish +4 more
doaj +1 more source
AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet.
Yazan Ahmad Alsariera +3 more
doaj +1 more source
Phishing Attacks Root Causes [PDF]
Nowadays, many people are losing considerable wealth due to online scams. Phishing is one of the means that a scammer can use to deceitfully obtain the victim’s personal identification, bank account information, or any other sensitive data. There are a number of anti-phishing techniques and tools in place, but unfortunately phishing still works. One of
Hossein Abroshan +3 more
openaire +1 more source
Phishing Classification Techniques: A Systematic Literature Review
Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations.
Rahmad Abdillah +3 more
doaj +1 more source
Investigation into Phishing Risk Behaviour among Healthcare Staff
A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ...
Prosper Kandabongee Yeng +3 more
doaj +1 more source
Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source

