Results 91 to 100 of about 27,296 (205)

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

open access: yes, 2017
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara   +2 more
core  

Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers

open access: yesIEEE Access
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai   +4 more
doaj   +1 more source

Indonesian SMEs and Cybersecurity: Developing Instrument to Test SMEs Owners’ Capability in Detecting Phishing Emails

open access: yesRiset Akuntansi dan Keuangan Indonesia
In recent years, phishing attacks have gotten more complicated and harder to detect. Technology-based preventative approaches have become utterly ineffective.
Ratna Yudhiyati   +2 more
doaj   +1 more source

Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks [PDF]

open access: yes, 2005
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer issues a challenge to the user over a network, in this case, the user issues a challenge to the computer.
Rachna Dhamija, J. D. Tygar
openaire   +1 more source

A comprehensive survey of AI-enabled phishing attacks detection techniques. [PDF]

open access: yesTelecommun Syst, 2021
Basit A   +5 more
europepmc   +1 more source

Phishing 2.0: exploring the capabilities and risks of agentic AI-enabled attacks

open access: yesFrontiers in Computer Science
IntroductionPhishing attacks have evolved rapidly with the integration of artificial intelligence, posing serious threats to digital trust and cybersecurity.
Pankaj Chandre   +5 more
doaj   +1 more source

Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game

open access: yesIEEE Access, 2019
The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS.
Xiayang Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy