Security challenges in industry 4.0 plc systems

J Hajda, R Jakuszewski, S Ogonowski - Applied Sciences, 2021 - mdpi.com
The concept of the fourth industrial revolution assumes the integration of people and digitally
controlled machines with the Internet and information technologies. At the end of 2015, more …

Exploring the evidence for email phishing training: A scoping review

N Marshall, D Sturman, JC Auton - Computers & Security, 2023 - Elsevier
Background Phishing emails are a pervasive threat to the security of confidential
information. To mitigate this risk, a range of training measures have been developed to …

Widening access to applied machine learning with tinyml

VJ Reddi, B Plancher, S Kennedy, L Moroney… - arXiv preprint arXiv …, 2021 - arxiv.org
Broadening access to both computational and educational resources is critical to diffusing
machine-learning (ML) innovation. However, today, most ML resources and experts are …

{“To} Do This Properly, You Need More {Resources”}: The Hidden Costs of Introducing Simulated Phishing Campaigns

L Brunken, A Buckmann, J Hielscher… - 32nd USENIX Security …, 2023 - usenix.org
Many organizations use phishing simulation campaigns to raise and measure their
employees' security awareness. They can create their own campaigns, or buy phishing-as-a …

{“Employees} Who {Don't} Accept the Time Security Takes Are Not Aware {Enough”}: The {CISO} View of {Human-Centred} Security

J Hielscher, U Menges, S Parkin, A Kluge… - 32nd USENIX Security …, 2023 - usenix.org
In larger organisations, the security controls and policies that protect employees are typically
managed by a Chief Information Security Officer (CISO). In research, industry, and policy …

{SoK}: Still Plenty of Phish in the Sea—A Taxonomy of {User-Oriented} Phishing Interventions and Avenues for Future Research

A Franz, V Zimmermann, G Albrecht, K Hartwig… - … Symposium on Usable …, 2021 - usenix.org
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous
approaches on anti-phishing measures have started to recognize the role of the user, who …

Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception

T Sutter, AS Bozkir, B Gehring, P Berlich - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …

Checking, nudging or scoring? Evaluating e-mail user security tools

SY Zheng, I Becker - Nineteenth Symposium on Usable Privacy and …, 2023 - usenix.org
Phishing e-mail threats are increasing in sophistication. Technical measures alone do not
fully prevent users from falling for them and common e-mail interfaces provide little support …

Presenting suspicious details in {User-Facing} e-mail headers does not improve phishing detection

S Zheng, I Becker - Eighteenth Symposium on Usable Privacy and …, 2022 - usenix.org
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be
inferred from e-mail header information commonly displayed by e-mail clients, such as …

Simulated phishing attack and embedded training campaign

W Yeoh, H Huang, WS Lee, F Al Jafari… - Journal of Computer …, 2022 - Taylor & Francis
Phishing attacks are costly for both organizations and individuals, yet existing academic
research has provided little guidance on how to strategize and implement a combined …