Results 21 to 30 of about 24,070 (256)

Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks

open access: yesInformation, 2020
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques.
Dania Aljeaid   +3 more
doaj   +1 more source

Cognitive Triaging of Phishing Attacks

open access: yesCoRR, 2019
In this paper we employ quantitative measurements of cognitive vulnerability triggers in phishing emails to predict the degree of success of an attack. To achieve this we rely on the cognitive psychology literature and develop an automated and fully quantitative method based on machine learning and econometrics to construct a triaging mechanism built ...
van der Heijden, Amber, Allodi, Luca
openaire   +4 more sources

Recognition of genuine and phishing emails may not be associated with response to phishing attacks [PDF]

open access: yesJournal of Universal Computer Science
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious ...
Alex Crgol, Simon Vrhovec
doaj   +3 more sources

A Survey of Machine Learning-Based Solutions for Phishing Website Detection

open access: yesMachine Learning and Knowledge Extraction, 2021
With the development of the Internet, network security has aroused people’s attention. It can be said that a secure network environment is a basis for the rapid and sound development of the Internet. Phishing is an essential class of cybercriminals which
Lizhen Tang, Qusay H. Mahmoud
doaj   +1 more source

Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game

open access: yesIEEE Access, 2019
The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS.
Xiayang Chen   +3 more
doaj   +1 more source

Phishing Attacks Survey: Types, Vectors, and Technical Approaches

open access: yesFuture Internet, 2020
Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which ...
Rana Alabdan
doaj   +1 more source

A Lightweight Anti-Phishing Technique for Mobile Phone

open access: yesActa Informatica Pragensia, 2017
Mobile phones have become an essential device for accessing the web. This is due to the advantages of portability, lower cost and ease. However, the adoption of mobile phones for online activities is now being challenged by myriads of cybercrimes. One of
Abdul Abiodun Orunsolu   +4 more
doaj   +1 more source

Piracema: a Phishing snapshot database for building dataset features

open access: yesScientific Reports, 2022
Phishing is an attack characterized by attempted fraud against users. The attacker develops a malicious page that is a trusted environment, inducing its victims to submit sensitive data.
Julio Cesar Gomes de Barros   +8 more
doaj   +1 more source

Analysis of the vulnerability of IT system users to a phishing attack

open access: yesJournal of Computer Sciences Institute, 2020
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The
Szymon Grzebielec
doaj   +1 more source

Improving the phishing website detection using empirical analysis of Function Tree and its variants

open access: yesHeliyon, 2021
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel less ...
Abdullateef O. Balogun   +10 more
doaj   +1 more source

Home - About - Disclaimer - Privacy