Results 221 to 230 of about 24,070 (256)
Some of the next articles are maybe not open access.

Attribute-Based Prevention of Phishing Attacks

2009 Eighth IEEE International Symposium on Network Computing and Applications, 2009
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider.To assess the effectiveness and applicability of this prototype,we performed extensive experimental testing.
Michael Atighetchi, Partha P. Pal
openaire   +1 more source

Phishing Attacks and Solutions

Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications, 2007
Mohamad Badra   +2 more
openaire   +1 more source

Can Phishing Education Enable Users To Recognize Phishing Attacks?. [PDF]

open access: possible, 2017
Phishing attacks have increased rapidly and caused many drastic damages and losses for internet users‟ .The purpose of this research is to investigate on effectiveness of phishing education and training to help users identify different forms of phishing threats.
openaire   +2 more sources

Anti-Phishing Attacks in Gamification

2021
Yousef Al-Hamar   +2 more
openaire   +1 more source

Phishing Attacks and Countermeasures

2010
This chapter surveys phishing attacks and their countermeasures. We first examine the underlying ecosystem that facilitates these attacks. Then we go into some detail with regard to the techniques phishers use, the kind of brands they target, as well as variations on traditional attacks. Finally, we describe several proposed countermeasures to phishing
openaire   +1 more source

A survey of phishing attack techniques, defence mechanisms and open research challenges

Enterprise Information Systems, 2022
Ankit Kumar Jain, Brij B Gupta
exaly  

Simulated Phishing Attack and Embedded Training Campaign

Journal of Computer Information Systems, 2022
William Yeoh   +2 more
exaly  

Phishing Attacks and Countermeasures

2007
The field of information security has realized many advances in the past few decades. Some of these innovations include new cryptographic techniques, network protocols, and hardware tokens. However, the weakest link in information security systems, human gullibility, remains extremely vulnerable.
openaire   +1 more source

Phishing Attacks

SSRN Electronic Journal
Rasool Mohammad   +6 more
openaire   +2 more sources

Phishing Attacks in Context: Organizational Factors Shaping Phishing Susceptibility.

Phishing remains a substantial threat, particularly in the context of email phishing. This study examines phishing susceptibility within an organizational setting, exploring how contextual factors influence cognitive processing and subsequent behavioral responses.
Hable, Fabian   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy