Results 71 to 80 of about 24,070 (256)
Anti-phishing as a web-based user service [PDF]
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande +3 more
doaj
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register ...
Alex Gontmakher +21 more
core +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
Optimizing Deep Neural Networks Using ANOVA for Web Phishing Detection
Phishing attacks are crimes committed by sending spoofed Web URLs that appear to come from a legitimate organization in order to obtain another party's sensitive information, such as usernames, passwords, and other confidential data.
Wulan Sri Lestari, Mustika Ulina
doaj +1 more source
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi +5 more
wiley +1 more source
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks.
Peter K. K. Loh +2 more
doaj +1 more source
Your employees: the front line in cyber security [PDF]
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer +7 more
core +1 more source

