Results 61 to 70 of about 28,722 (249)

Particle Swarm Optimization-Based Feature Weighting for Improving Intelligent Phishing Website Detection

open access: yesIEEE Access, 2020
Over the last few years, web phishing attacks have been constantly evolving causing customers to lose trust in e-commerce and online services. Various tools and systems based on a blacklist of phishing websites are applied to detect the phishing websites.
Waleed Ali, Sharaf Malebary
doaj   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

From Classroom to Cabinet: Bridging Digital Competency and Organizational Support in Nova Scotia's Public Sector

open access: yesCanadian Public Administration, EarlyView.
Abstract This research examined the relationship between digital competency and perceived organizational support among Nova Scotia public servants and MPA students. Findings revealed a non‐linear developmental progression where reliance on external validation systematically diminished as expertise matures.
Warwick Young, Kristian Suen
wiley   +1 more source

Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions

open access: yesIET Networks, 2020
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly.
M. Vijayalakshmi   +3 more
doaj   +1 more source

Survey on Ethereum phishing detection technology

open access: yes网络与信息安全学报, 2023
With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high ...
Zhao CAI, Tao JING, Shuang REN
doaj   +1 more source

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

open access: yes, 2017
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register ...
Alex Gontmakher   +21 more
core   +1 more source

“I Paid A Bribe”—Lessons and Insights From Crowdsourced Corruption Reporting in India

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Preventing and reducing corruption has proven to be an enormous challenge. An important step in this process is to produce and use good metrics to identify where anti‐corruption resources would be most beneficial. Most measures of corruption, however, rely on surveys of perceptions or bribery incidence.
Ina Kubbe   +2 more
wiley   +1 more source

Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning

open access: yesIEEE Access, 2019
As a crime of employing technical means to steal sensitive information of users, phishing is currently a critical threat facing the Internet, and losses due to phishing are growing steadily.
Peng Yang, Guangzhen Zhao, Peng Zeng
doaj   +1 more source

Detecting and characterizing lateral phishing at scale [PDF]

open access: yes, 2019
We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to
Cidon, A   +7 more
core   +2 more sources

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy