Results 181 to 190 of about 1,061,727 (224)
Some of the next articles are maybe not open access.
SSRN Electronic Journal
The most common attack in the Phishing world is via a fake website. The Attacker needs to send an email to victims that directs them to a website. The page is designed to look like one the victim commonly uses so that the victim might insert their ...
Rasool Mohammad +6 more
semanticscholar +3 more sources
The most common attack in the Phishing world is via a fake website. The Attacker needs to send an email to victims that directs them to a website. The page is designed to look like one the victim commonly uses so that the victim might insert their ...
Rasool Mohammad +6 more
semanticscholar +3 more sources
Human Factors in Phishing Attacks: A Systematic Literature Review
ACM Computing Surveys, 2021Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in digital communication. It is a type of cyber attack often successful because users are not aware of their vulnerabilities or are unable to
Giuseppe Desolda +4 more
semanticscholar +1 more source
Phishing Attacks Detection using Machine Learning and Deep Learning Models
2022 7th International Conference on Data Science and Machine Learning Applications (CDMA), 2022Because of the fast expansion of internet users, phishing attacks have become a significant menace where the attacker poses as a trusted entity in order to steal sensitive data, causing reputational damage, loss of money, ransomware, or other malware ...
M. Aljabri, Samiha Mirza
semanticscholar +1 more source
Proceedings of the 2019 ACM Southeast Conference, 2019
Social engineering is the process of getting a person to provide a service or complete a task that may give away private or confidential information. Phishing is the most common type of social engineering. In phishing, an attacker poses as a trustworthy source in an attempt to have the victim release personal or private information. Spear phishing is a
Alex Sumner, Xiaohong Yuan
openaire +1 more source
Social engineering is the process of getting a person to provide a service or complete a task that may give away private or confidential information. Phishing is the most common type of social engineering. In phishing, an attacker poses as a trustworthy source in an attempt to have the victim release personal or private information. Spear phishing is a
Alex Sumner, Xiaohong Yuan
openaire +1 more source
Evaluating user susceptibility to phishing attacks
Information and Computer Security, 2022Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data breaches and subsequent financial losses.
Sanchari Das +2 more
semanticscholar +1 more source
Phishing Attacks on Modern Android
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018Modern versions of Android have introduced a number of features in the name of convenience. This paper shows how two of these features, mobile password managers and Instant Apps, can be abused to make phishing attacks that are significantly more practical than existing ones.
Aonzo S. +3 more
openaire +1 more source
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns
ARES, 2022Phishing attacks are still a general and world-wide threat to users of the Internet. In the past, several approaches to detect phishing websites earlier and shorten the time frame between their creation and inclusion in a blocklist have been proposed ...
Vincent Drury, Luisa Lux, Ulrike Meyer
semanticscholar +1 more source
2021
Abstract: The Internet has a remarkable platform for common people communication. People with criminal mind have found a way of stealing personal information without actually meeting them and with the least risk of being caught. It`s far known as Phishing. Phishing poses a big danger to the e-commerce enterprise.
Josmy Joseph, Merin Manoj
openaire +1 more source
Abstract: The Internet has a remarkable platform for common people communication. People with criminal mind have found a way of stealing personal information without actually meeting them and with the least risk of being caught. It`s far known as Phishing. Phishing poses a big danger to the e-commerce enterprise.
Josmy Joseph, Merin Manoj
openaire +1 more source
Phishing Attacks and Detection Techniques: A Systematic Review
2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG)Phishing continues to stand out as one of the foremost obstacles confronting online users, with a substantial number falling victim to it. Researchers are actively seeking solutions to combat this serious cyber threat, given its increasing complexity and
Ruth Korede Ayeni +3 more
semanticscholar +1 more source
International Conference on Intelligent Computing, 2021
Phishing attacks are the most common type of cyber-attacks used to obtain sensitive information and have been affecting individuals as well as organisations across the globe.
Sohail Ahmed Khan +2 more
semanticscholar +1 more source
Phishing attacks are the most common type of cyber-attacks used to obtain sensitive information and have been affecting individuals as well as organisations across the globe.
Sohail Ahmed Khan +2 more
semanticscholar +1 more source

