Designing a Mobile Game for Home Computer Users to Protect Against “Phishing Attacks”
Nalin Asanka Gamagedara Arachchilage +1 more
openalex +1 more source
Empowering the nursing workforce for cyber-resilience: Strategic preparedness and care management during hospital cyberattacks. [PDF]
Dorosti AM +3 more
europepmc +1 more source
Safe Browsing: A Comprehensive Framework to Minimize Phishing Attacks and Enhance online Security.
Shubham Subhash Ghatkar, Shaikh Zarina Abdul Aziz
openalex +2 more sources
Incident-aware smart prioritization framework for penetration testing and prevention of URL-based cybersecurity attacks in industry 4.0 IoT networks. [PDF]
Nurlan Z +7 more
europepmc +1 more source
Domain-independent deception: a new taxonomy and linguistic analysis. [PDF]
Verma RM +4 more
europepmc +1 more source
When the Firewall Fails: A Digital Wake-Up Call for Dermatology. [PDF]
Madhumita M, Ponnarasu S, Ancy A.
europepmc +1 more source
The Interplay of 2FA and Phishing: A Review of Attack Routes and Booth dealings
Henry Peter Ovili +5 more
openalex +1 more source
Comparative Simulation of Phishing Attacks on a Critical Information Infrastructure Organization: An Empirical Study [PDF]
Patsita Sirawongphatsara +3 more
openalex +1 more source
Phishing Attacks and Counter Measures
Sophia Kingsley Okore, Benisemeni Zakka
openaire +1 more source

