Results 91 to 100 of about 28,722 (249)
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
IntroductionThe dynamic and sophisticated nature of phishing attacks, coupled with the relatively weak anti-phishing tools, has made phishing detection a pressing challenge.
Maruf A. Tamal +4 more
doaj +1 more source
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi +5 more
wiley +1 more source
OFF-The-Hook: A Tool to Detect Zero-Font and Traditional Phishing Attacks in Real Time
Phishing attacks continue to pose serious challenges to cybersecurity, with attackers constantly refining their methods to bypass detection systems. One particularly evasive technique is Zero-Font phishing, which involves the insertion of invisible or ...
Nazar Abbas Saqib +9 more
doaj +1 more source
The Role of Cue Utilization and Cognitive Load in the Recognition of Phishing Emails
Phishing emails represent a major threat to online information security. While the prevailing research is focused on users' susceptibility, few studies have considered the decision-making strategies that account for skilled detection.
George Nasser +6 more
doaj +1 more source
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
The phishing email is one of the significant threats in the world today and has caused tremendous financial losses. Although the methods of confrontation are continually being updated, the results of those methods are not very satisfactory at present ...
Yong Fang +4 more
doaj +1 more source
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core +1 more source
With the rapid expansion of the internet and the growing sophistication of cyber threats, phishing attacks have become a serious cybersecurity challenge for individuals and organizations.
Yanche Ari Kustiawan +1 more
doaj +1 more source
Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking
Phishing is one of the most harmful social engineering techniques to subdue end users where threat actors find a chance to gain access to critical information systems.
Tommy Chin, Kaiqi Xiong, Chengbin Hu
doaj +1 more source

