Results 31 to 40 of about 1,061,727 (224)
Phishing is an online scam where criminals trick users with various strategies, with the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal or organisational Information Technology resources. Multiple studies
Hossein Abroshan +3 more
doaj +1 more source
High Accuracy Phishing Detection Based on Convolutional Neural Networks [PDF]
The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber-attacks.
Alzaylaee, Mohammed K. +1 more
core +2 more sources
An Effective and Secure Mechanism for Phishing Attacks Using a Machine Learning Approach
Phishing is one of the biggest crimes in the world and involves the theft of the user’s sensitive data. Usually, phishing websites target individuals’ websites, organizations, sites for cloud storage, and government websites.
Gori Mohamed +4 more
semanticscholar +1 more source
Phishing Classification Techniques: A Systematic Literature Review
Phishing has become a serious and concerning problem within the past 10 years, with many reviews describing attack patterns and anticipating different method utilizations.
Rahmad Abdillah +3 more
doaj +1 more source
Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.
Key Points Question Are employees at US health care institutions susceptible to phishing attacks? Findings In this multicenter quality improvement study, more than 2.9 million simulated emails were sent to employees at 6 hospitals, with a median click ...
Gordon WJ +12 more
europepmc +2 more sources
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
Phish Derby: Shoring the Human Shield Through Gamified Phishing Attacks
To better understand employees’ reporting behaviors in relation to phishing emails, we gamified the phishing security awareness training process by creating and conducting a month-long “Phish Derby” competition at a large university in the U.S.
Matthew Canham +2 more
semanticscholar +1 more source
Spear-Phishing Susceptibility Stemming From Personality Traits
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie +2 more
doaj +1 more source
Scalable Detection and Isolation of Phishing [PDF]
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core +2 more sources
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee +4 more
doaj +1 more source

