Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception

T Sutter, AS Bozkir, B Gehring, P Berlich - IEEE Access, 2022 - ieeexplore.ieee.org
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …

A review of organization-oriented phishing research

K Althobaiti, N Alsufyani - PeerJ Computer Science, 2024 - peerj.com
The increased sophistication and frequency of phishing attacks that target organizations
necessitate a comprehensive cyber security strategy to handle phishing attacks from several …

[PDF][PDF] Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study …

K Okokpujie, CG Kennedy, K Nnodu… - International Journal …, 2023 - researchgate.net
Accepted: 1 November 2022 With the advancement in information communication
technology (ICT), cyber-attacks have become a global phenomenon, with email phishing at …

SOAiCE: simulation of attacks in cloud computing environment

V Vishal, R Johari - … on Cloud Computing, Data Science & …, 2018 - ieeexplore.ieee.org
Security of data is the most important concern on the network. When information is
transmitted over the network, various attacks are launched by attacker on the information …

Data Acquisition and Corpus Creation for Phishing Detection

I Dunđer, S Seljan, M Odak - 2023 46th MIPRO ICT and …, 2023 - ieeexplore.ieee.org
Detecting phishing attacks is not straightforward, since there are many obstacles that derive
from language complexity and technical aspects. Studying phishing attacks and other …

Exploring Factors Influencing Internet Users' Susceptibility to Deepfake Phishing

S Gal, B Bulgurcu - 2024 - aisel.aisnet.org
This proposed study investigates the factors that influence susceptibility to deepfake
phishing, a modern technique that employs artificial intelligence to create realistic but fake …

[PDF][PDF] Identifying phishing websites through url parsing

A Anitha, KS Gudivada, SK RLMK… - International journal of …, 2019 - academia.edu
Identifying the acts of phishing in the websites is mostly done using the classification
techniques based on machine learning or data mining. Many algorithms have been used for …

Attacks and Security Schemes in Cloud Computing: A Survey

P Jain, R Barskar, U Chourasia - Proceedings of the International …, 2022 - Springer
Cloud computing provides the virtual environment for users to access the hardware
resources and services. The resources such as storage, applications, services, networks …

Exploring vulnerabilities and mitigation strategies among high school students: A qualitative analysis study

M Akese, O Hussein - 2024 - diva-portal.org
Phishing attacks have emerged as a prominent cybersecurity threat, with one demographic
particularly vulnerable being high school students, who are often active on social media yet …