Results 111 to 120 of about 27,296 (205)

Phishing Attacks Execution

open access: yesJournal of Information Systems Engineering and Management
The rapid advancement of technology has made cybersecurity a crucial industry. One such prominent menace is phishing, which refers to any fraudulent act aimed at collecting personal data like passwords and credit card information under the guise of genuine organizations.Phishing attacks are often performed through electronic email, social media ...
openaire   +1 more source

Application of Machine Learning for Real-Time Phishing Attack Detection

open access: yesITEGAM-JETIA
Over the years, the Internet has been exploited to carry out a range of cyber attacks, with phishing being the most prominent one. Increasingly sophisticated techniques of phishing have threatened the security of many Internet-based systems.
Akshay Shankar Agrawal   +4 more
doaj   +1 more source

Study on Phishing Attacks

open access: yesInternational Journal of Computer Applications, 2018
Shabnam Sharma   +2 more
openaire   +1 more source

Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.

open access: yesJAMA Netw Open, 2019
Gordon WJ   +12 more
europepmc   +1 more source

MeAJOR: Merged email assets from joint open-source repositories. [PDF]

open access: yesData Brief
Cardoso F   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy