Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara +2 more
core
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai +4 more
doaj +1 more source
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. [PDF]
Al-Qahtani AF, Cresci S.
europepmc +1 more source
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati +2 more
doaj +1 more source
Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. [PDF]
Lee YY, Gan CL, Liew TW.
europepmc +1 more source
Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks. [PDF]
Daengsi T +2 more
europepmc +1 more source
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks [PDF]
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer issues a challenge to the user over a network, in this case, the user issues a challenge to the computer.
Rachna Dhamija, J. D. Tygar
openaire +1 more source
A comprehensive survey of AI-enabled phishing attacks detection techniques. [PDF]
Basit A +5 more
europepmc +1 more source
Phishing 2.0: exploring the capabilities and risks of agentic AI-enabled attacks
IntroductionPhishing attacks have evolved rapidly with the integration of artificial intelligence, posing serious threats to digital trust and cybersecurity.
Pankaj Chandre +5 more
doaj +1 more source
Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game
The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS.
Xiayang Chen +3 more
doaj +1 more source

