Results 31 to 40 of about 27,296 (205)

Spear-Phishing Susceptibility Stemming From Personality Traits

open access: yesIEEE Access, 2022
This study explores the psychological aspects of social engineering by analyzing personality traits in the context of spear-phishing attacks. Phishing emails were constructed by leveraging multiple vulnerable personality traits to maximize the success of
Sergiu Eftimie   +2 more
doaj   +1 more source

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

Cognitive Triaging of Phishing Attacks

open access: yesCoRR, 2019
In this paper we employ quantitative measurements of cognitive vulnerability triggers in phishing emails to predict the degree of success of an attack. To achieve this we rely on the cognitive psychology literature and develop an automated and fully quantitative method based on machine learning and econometrics to construct a triaging mechanism built ...
van der Heijden, Amber, Allodi, Luca
openaire   +4 more sources

Scalable Detection and Isolation of Phishing [PDF]

open access: yes, 2009
This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and to employ the novel bad neighborhood concept, in order to detect and isolate both ...
Moreira Moura, G.C., Pras, A.
core   +2 more sources

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups

open access: yesIEEE Access, 2021
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect
Jaeil Lee   +4 more
doaj   +1 more source

Intelligent Security for Phishing Online using Adaptive Neuro Fuzzy Systems [PDF]

open access: yes, 2017
Anti-phishing detection solutions employed in industry use blacklist-based approaches to achieve low false-positive rates, but blacklist approaches utilizes website URLs only.
Barraclough, Phoebe, Fehringer, Gerhard
core   +1 more source

Clone Phishing: Attacks and Defenses

open access: yesInternational Journal of Scientific and Research Publications, 2023
 Clone phishing is a cyberattack in which offenders create a fake website or email that looks like a legitimate one to trick users into giving up sensitive information. This paper covers clone phishing strategies, examples, and impacts on people and organisations.
openaire   +1 more source

Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often ...
Marco Casagrande   +3 more
doaj  

A phishing attack awareness framework for a South African University of Technology

open access: yesSouth African Journal of Information Management
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb   +2 more
doaj   +1 more source

Enhancing Cybersecurity: The Crucial Role of Self-Regulation, Information Processing, and Financial Knowledge in Combating Phishing Attacks

open access: yesSAGE Open, 2023
In today’s technologically advanced world, the escalating prevalence of phishing attacks necessitates an urgent exploration of effective countermeasures.
Muhammad Waqas   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy