Security challenges in industry 4.0 plc systems
J Hajda, R Jakuszewski, S Ogonowski - Applied Sciences, 2021 - mdpi.com
The concept of the fourth industrial revolution assumes the integration of people and digitally
controlled machines with the Internet and information technologies. At the end of 2015, more …
controlled machines with the Internet and information technologies. At the end of 2015, more …
Exploring the evidence for email phishing training: A scoping review
Background Phishing emails are a pervasive threat to the security of confidential
information. To mitigate this risk, a range of training measures have been developed to …
information. To mitigate this risk, a range of training measures have been developed to …
Widening access to applied machine learning with tinyml
Broadening access to both computational and educational resources is critical to diffusing
machine-learning (ML) innovation. However, today, most ML resources and experts are …
machine-learning (ML) innovation. However, today, most ML resources and experts are …
{“To} Do This Properly, You Need More {Resources”}: The Hidden Costs of Introducing Simulated Phishing Campaigns
L Brunken, A Buckmann, J Hielscher… - 32nd USENIX Security …, 2023 - usenix.org
Many organizations use phishing simulation campaigns to raise and measure their
employees' security awareness. They can create their own campaigns, or buy phishing-as-a …
employees' security awareness. They can create their own campaigns, or buy phishing-as-a …
{“Employees} Who {Don't} Accept the Time Security Takes Are Not Aware {Enough”}: The {CISO} View of {Human-Centred} Security
In larger organisations, the security controls and policies that protect employees are typically
managed by a Chief Information Security Officer (CISO). In research, industry, and policy …
managed by a Chief Information Security Officer (CISO). In research, industry, and policy …
{SoK}: Still Plenty of Phish in the Sea—A Taxonomy of {User-Oriented} Phishing Interventions and Avenues for Future Research
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous
approaches on anti-phishing measures have started to recognize the role of the user, who …
approaches on anti-phishing measures have started to recognize the role of the user, who …
Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …
Checking, nudging or scoring? Evaluating e-mail user security tools
SY Zheng, I Becker - Nineteenth Symposium on Usable Privacy and …, 2023 - usenix.org
Phishing e-mail threats are increasing in sophistication. Technical measures alone do not
fully prevent users from falling for them and common e-mail interfaces provide little support …
fully prevent users from falling for them and common e-mail interfaces provide little support …
Presenting suspicious details in {User-Facing} e-mail headers does not improve phishing detection
S Zheng, I Becker - Eighteenth Symposium on Usable Privacy and …, 2022 - usenix.org
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be
inferred from e-mail header information commonly displayed by e-mail clients, such as …
inferred from e-mail header information commonly displayed by e-mail clients, such as …
Simulated phishing attack and embedded training campaign
Phishing attacks are costly for both organizations and individuals, yet existing academic
research has provided little guidance on how to strategize and implement a combined …
research has provided little guidance on how to strategize and implement a combined …