Results 31 to 40 of about 28,445 (242)
People are increasingly sharing their personal information online as internet usage grows. As a result, fraudsters have access to a massive amount of personal information and financial activities.
Riyadh Rahef Nuiaa Al Ogaili +1 more
doaj +1 more source
Phishing Techniques in Mobile Devices
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core +1 more source
Baiting the hook: factors impacting susceptibility to phishing attacks [PDF]
Over the last decade, substantial progress has been made in understanding and mitigating phishing attacks. Nonetheless, the percentage of successful attacks is still on the rise.
Erola, Arnau +2 more
core +2 more sources
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
SI
Felipe Castaño +3 more
openaire +4 more sources
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing.
Dwi Wina Adani +2 more
doaj +1 more source
Classification of Phishing Email Using Random Forest Machine Learning Technique
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu +1 more
doaj +1 more source
Phishing Detection System Through Hybrid Machine Learning Based on URL
Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first used in 1996, it has become the most severe and dangerous cybercrime on the internet.
Abdul Karim +4 more
doaj +1 more source
Recognition of genuine and phishing emails may not be associated with response to phishing attacks [PDF]
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious ...
Alex Crgol, Simon Vrhovec
doaj +3 more sources
Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems [PDF]
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only.
Barraclough, Phoebe, Fehringer, Gerhard
core +1 more source
Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Stevenson, Robert Louis B.
core +2 more sources

