Results 111 to 120 of about 28,445 (242)

Phishing 2.0: exploring the capabilities and risks of agentic AI-enabled attacks

open access: yesFrontiers in Computer Science
IntroductionPhishing attacks have evolved rapidly with the integration of artificial intelligence, posing serious threats to digital trust and cybersecurity.
Pankaj Chandre   +5 more
doaj   +1 more source

Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game

open access: yesIEEE Access, 2019
The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS.
Xiayang Chen   +3 more
doaj   +1 more source

An application for predicting phishing attacks: A case of implementing a support vector machine learning model

open access: yesCyber Security and Applications
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable users into divulging confidential data like medical ...
Emmanuel Song Shombot   +3 more
doaj   +1 more source

Scam Pandemic: How Attackers Exploit Public Fear through Phishing [PDF]

open access: green, 2020
Marzieh Bitaab   +11 more
openalex   +1 more source

Towards a Hybrid Security Framework for Phishing Awareness Education and Defense

open access: yesFuture Internet
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks.
Peter K. K. Loh   +2 more
doaj   +1 more source

Phishing Attacks: Detection And Prevention

open access: yes, 2020
5 pages, 7 figures, 1 table, essential ...
openaire   +2 more sources

Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis

open access: yesIEEE Access
Phishing attacks are a growing threat that has evolved along with technological advancements. Existing detection methods struggle with constantly evolving tactics and “zero-day” attacks that exploit unknown vulnerabilities.
Gabriela Brezeanu   +2 more
doaj   +1 more source

Protection Mechanisms Against Phishing Attacks

open access: yes, 2005
Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication.
Plössl, Klaus   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy