[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

Defending against phishing attacks: taxonomy of methods, current issues and future directions

BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …

Phishing in organizations: Findings from a large-scale and long-term study

D Lain, K Kostiainen, S Čapkun - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …

A systematic review of multimedia tools for cybersecurity awareness and education

L Zhang-Kennedy, S Chiasson - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
We conduct a comprehensive review covering academic publications and industry products
relating to tools for cybersecurity awareness and education aimed at non-expert end-users …

A comprehensive quality evaluation of security and privacy advice on the web

EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …

Susceptibility to spear-phishing emails: Effects of internet user demographics and email content

T Lin, DE Capecci, DM Ellis, HA Rocha… - ACM Transactions on …, 2019 - dl.acm.org
Phishing is fundamental to cyber attacks. This research determined the effect of Internet user
age and email content such as weapons of influence (persuasive techniques that attackers …

Phishing detection: a literature survey

M Khonji, Y Iraqi, A Jones - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
This article surveys the literature on the detection of phishing attacks. Phishing attacks target
vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread …

Security awareness of computer users: A phishing threat avoidance perspective

NAG Arachchilage, S Love - Computers in human behavior, 2014 - Elsevier
Phishing is an online identity theft, which aims to steal confidential information such as
username, password and online banking details from its victims. To prevent this, anti …

Fighting against phishing attacks: state of the art and future challenges

BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …