Results 71 to 80 of about 24,070 (256)

Anti-phishing as a web-based user service [PDF]

open access: yes, 2006
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core  

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande   +3 more
doaj  

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

open access: yes, 2017
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register ...
Alex Gontmakher   +21 more
core   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

Optimizing Deep Neural Networks Using ANOVA for Web Phishing Detection

open access: yesTeknika
Phishing attacks are crimes committed by sending spoofed Web URLs that appear to come from a legitimate organization in order to obtain another party's sensitive information, such as usernames, passwords, and other confidential data.
Wulan Sri Lestari, Mustika Ulina
doaj   +1 more source

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, Volume 3, Issue 1, Page 39-51, April 2026.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Towards a Hybrid Security Framework for Phishing Awareness Education and Defense

open access: yesFuture Internet
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks.
Peter K. K. Loh   +2 more
doaj   +1 more source

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy