Results 31 to 40 of about 27,296 (205)
Spear-Phishing Susceptibility Stemming From Personality Traits
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie +2 more
doaj +1 more source
Artificial intelligence in the cyber domain: Offense and defense [PDF]
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao +2 more
core +1 more source
Cognitive Triaging of Phishing Attacks
In this paper we employ quantitative measurements of cognitive vulnerability triggers in phishing emails to predict the degree of success of an attack. To achieve this we rely on the cognitive psychology literature and develop an automated and fully quantitative method based on machine learning and econometrics to construct a triaging mechanism built ...
van der Heijden, Amber, Allodi, Luca
openaire +4 more sources
Scalable Detection and Isolation of Phishing [PDF]
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core +2 more sources
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee +4 more
doaj +1 more source
Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems [PDF]
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only.
Barraclough, Phoebe, Fehringer, Gerhard
core +1 more source
Clone Phishing: Attacks and Defenses
Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire +1 more source
Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande +3 more
doaj
A phishing attack awareness framework for a South African University of Technology
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb +2 more
doaj +1 more source
In today’s technologically advanced world, the escalating prevalence of phishing attacks necessitates an urgent exploration of effective countermeasures.
Muhammad Waqas +3 more
doaj +1 more source

