Results 221 to 230 of about 24,070 (256)
Some of the next articles are maybe not open access.
Attribute-Based Prevention of Phishing Attacks
2009 Eighth IEEE International Symposium on Network Computing and Applications, 2009This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider.To assess the effectiveness and applicability of this prototype,we performed extensive experimental testing.
Michael Atighetchi, Partha P. Pal
openaire +1 more source
Phishing Attacks and Solutions
Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications, 2007Mohamad Badra +2 more
openaire +1 more source
Can Phishing Education Enable Users To Recognize Phishing Attacks?. [PDF]
Phishing attacks have increased rapidly and caused many drastic damages and losses for internet users‟ .The purpose of this research is to investigate on effectiveness of phishing education and training to help users identify different forms of phishing threats.
openaire +2 more sources
Phishing Attacks and Countermeasures
2010This chapter surveys phishing attacks and their countermeasures. We first examine the underlying ecosystem that facilitates these attacks. Then we go into some detail with regard to the techniques phishers use, the kind of brands they target, as well as variations on traditional attacks. Finally, we describe several proposed countermeasures to phishing
openaire +1 more source
A survey of phishing attack techniques, defence mechanisms and open research challenges
Enterprise Information Systems, 2022Ankit Kumar Jain, Brij B Gupta
exaly
Simulated Phishing Attack and Embedded Training Campaign
Journal of Computer Information Systems, 2022William Yeoh +2 more
exaly
Phishing Attacks and Countermeasures
2007The field of information security has realized many advances in the past few decades. Some of these innovations include new cryptographic techniques, network protocols, and hardware tokens. However, the weakest link in information security systems, human gullibility, remains extremely vulnerable.
openaire +1 more source
Phishing Attacks in Context: Organizational Factors Shaping Phishing Susceptibility.
Phishing remains a substantial threat, particularly in the context of email phishing. This study examines phishing susceptibility within an organizational setting, exploring how contextual factors influence cognitive processing and subsequent behavioral responses.Hable, Fabian +2 more
openaire +2 more sources

