Results 51 to 60 of about 24,070 (256)

Detecting and characterizing lateral phishing at scale [PDF]

open access: yes, 2019
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A   +7 more
core   +2 more sources

Conceptualizing human resilience in the face of the global epidemiology of cyber attacks [PDF]

open access: yes, 2019
Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global ...
Camp, L. Jean   +5 more
core   +3 more sources

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Gabor-based Fingerprint Authentication for Anti-phishing System [PDF]

open access: yesEngineering and Technology Journal, 2016
E-banking is banking system in which the customers conduct transactions electronically via the Internet. Most of these sites are prone to a phishing attack.
Soukaena H. Hashem   +2 more
doaj   +1 more source

Characterizing Phishing Threats with Natural Language Processing

open access: yes, 2015
Spear phishing is a widespread concern in the modern network security landscape, but there are few metrics that measure the extent to which reconnaissance is performed on phishing targets.
Kotson, Michael C., Schulz, Alexia
core   +1 more source

Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting

open access: yesSystems Engineering, EarlyView.
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley   +1 more source

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

A phishing attack awareness framework for a South African University of Technology

open access: yesSouth African Journal of Information Management
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb   +2 more
doaj   +1 more source

Qualitative exploration of trust towards online banking for phishing attack victims / Siti Sarah Md Ilyas [PDF]

open access: yes, 2017
The number of phishing attacks involving online banking has records an increase percentage over the years in Malaysia. Phishing attacks impact the victims in various sentiments of emotional, mental and physical. The enormous effect is the victims exposed
Md Ilyas, Siti Sarah
core  

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy