Results 61 to 70 of about 1,061,727 (224)
Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Stevenson, Robert Louis B.
core +2 more sources
Recognition of genuine and phishing emails may not be associated with response to phishing attacks [PDF]
This paper investigates the associations between recognition of phishing and genuine emails, and response to phishing attacks, namely susceptibility to phishing emails (i.e., click rate) and full phishing attack compliance (i.e., click on a malicious ...
Alex Crgol, Simon Vrhovec
doaj +3 more sources
Personalized Model‐Driven Interventions for Decisions From Experience
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford +6 more
wiley +1 more source
Cognitive Triaging of Phishing Attacks
In this paper we employ quantitative measurements of cognitive vulnerability triggers in phishing emails to predict the degree of success of an attack. To achieve this we rely on the cognitive psychology literature and develop an automated and fully quantitative method based on machine learning and econometrics to construct a triaging mechanism built ...
van der Heijden, Amber, Allodi, Luca
openaire +3 more sources
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet.
Yazan Ahmad Alsariera +3 more
doaj +1 more source
Can Phishing Education Enable Users To Recognize Phishing Attacks?. [PDF]
Phishing attacks have increased rapidly and caused many drastic damages and losses for internet users‟ .The purpose of this research is to investigate on effectiveness of phishing education and training to help users identify different forms of phishing threats.
openaire +2 more sources
Types of anti-phishing solutions for phishing attack
Abstract Nowadays, many people use Internet to do online activity. This scenario exposed them to danger in Internet which is phishing attack. In order to solve phishing attack, the anti-phishing solutions are needed. Based on our review, there are still lacks of articles that review on the types of anti-phishing solutions in detail.
Siti Hawa Apandi +2 more
openaire +1 more source
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley +1 more source
Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking
Phishing is one of the most harmful social engineering techniques to subdue end users where threat actors find a chance to gain access to critical information systems.
Tommy Chin, Kaiqi Xiong, Chengbin Hu
doaj +1 more source

