Results 21 to 30 of about 24,070 (256)
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques.
Dania Aljeaid +3 more
doaj +1 more source
Cognitive Triaging of Phishing Attacks
In this paper we employ quantitative measurements of cognitive vulnerability triggers in phishing emails to predict the degree of success of an attack. To achieve this we rely on the cognitive psychology literature and develop an automated and fully quantitative method based on machine learning and econometrics to construct a triaging mechanism built ...
van der Heijden, Amber, Allodi, Luca
openaire +4 more sources
Recognition of genuine and phishing emails may not be associated with response to phishing attacks [PDF]
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious ...
Alex Crgol, Simon Vrhovec
doaj +3 more sources
A Survey of Machine Learning-Based Solutions for Phishing Website Detection
With the development of the Internet, network security has aroused people’s attention. It can be said that a secure network environment is a basis for the rapid and sound development of the Internet. Phishing is an essential class of cybercriminals which
Lizhen Tang, Qusay H. Mahmoud
doaj +1 more source
Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game
The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS.
Xiayang Chen +3 more
doaj +1 more source
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj +1 more source
A Lightweight Anti-Phishing Technique for Mobile Phone
Mobile phones have become an essential device for accessing the web. This is due to the advantages of portability, lower cost and ease. However, the adoption of mobile phones for online activities is now being challenged by myriads of cybercrimes. One of
Abdul Abiodun Orunsolu +4 more
doaj +1 more source
Piracema: a Phishing snapshot database for building dataset features
Phishing is an attack characterized by attempted fraud against users. The attacker develops a malicious page that is a trusted environment, inducing its victims to submit sensitive data.
Julio Cesar Gomes de Barros +8 more
doaj +1 more source
Analysis of the vulnerability of IT system users to a phishing attack
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The
Szymon Grzebielec
doaj +1 more source
Improving the phishing website detection using empirical analysis of Function Tree and its variants
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun +10 more
doaj +1 more source

