Results 181 to 190 of about 28,445 (242)

Designing a Mobile Game for Home Computer Users to Protect Against “Phishing Attacks”

open access: diamond, 2011
Nalin Asanka Gamagedara Arachchilage   +1 more
openalex   +1 more source

Incident-aware smart prioritization framework for penetration testing and prevention of URL-based cybersecurity attacks in industry 4.0 IoT networks. [PDF]

open access: yesSci Rep
Nurlan Z   +7 more
europepmc   +1 more source

Domain-independent deception: a new taxonomy and linguistic analysis. [PDF]

open access: yesFront Big Data
Verma RM   +4 more
europepmc   +1 more source

When the Firewall Fails: A Digital Wake-Up Call for Dermatology. [PDF]

open access: yesIndian Dermatol Online J
Madhumita M, Ponnarasu S, Ancy A.
europepmc   +1 more source

The Interplay of 2FA and Phishing: A Review of Attack Routes and Booth dealings

open access: green
Henry Peter Ovili   +5 more
openalex   +1 more source

Comparative Simulation of Phishing Attacks on a Critical Information Infrastructure Organization: An Empirical Study [PDF]

open access: green
Patsita Sirawongphatsara   +3 more
openalex   +1 more source

Phishing Attacks and Counter Measures

open access: yesInternational Journal of Computer Trends and Technology, 2015
Sophia Kingsley Okore, Benisemeni Zakka
openaire   +1 more source

Home - About - Disclaimer - Privacy