Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …
A review of organization-oriented phishing research
K Althobaiti, N Alsufyani - PeerJ Computer Science, 2024 - peerj.com
The increased sophistication and frequency of phishing attacks that target organizations
necessitate a comprehensive cyber security strategy to handle phishing attacks from several …
necessitate a comprehensive cyber security strategy to handle phishing attacks from several …
[PDF][PDF] Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study …
K Okokpujie, CG Kennedy, K Nnodu… - International Journal …, 2023 - researchgate.net
Accepted: 1 November 2022 With the advancement in information communication
technology (ICT), cyber-attacks have become a global phenomenon, with email phishing at …
technology (ICT), cyber-attacks have become a global phenomenon, with email phishing at …
SOAiCE: simulation of attacks in cloud computing environment
V Vishal, R Johari - … on Cloud Computing, Data Science & …, 2018 - ieeexplore.ieee.org
Security of data is the most important concern on the network. When information is
transmitted over the network, various attacks are launched by attacker on the information …
transmitted over the network, various attacks are launched by attacker on the information …
Data Acquisition and Corpus Creation for Phishing Detection
Detecting phishing attacks is not straightforward, since there are many obstacles that derive
from language complexity and technical aspects. Studying phishing attacks and other …
from language complexity and technical aspects. Studying phishing attacks and other …
Exploring Factors Influencing Internet Users' Susceptibility to Deepfake Phishing
S Gal, B Bulgurcu - 2024 - aisel.aisnet.org
This proposed study investigates the factors that influence susceptibility to deepfake
phishing, a modern technique that employs artificial intelligence to create realistic but fake …
phishing, a modern technique that employs artificial intelligence to create realistic but fake …
[PDF][PDF] Identifying phishing websites through url parsing
A Anitha, KS Gudivada, SK RLMK… - International journal of …, 2019 - academia.edu
Identifying the acts of phishing in the websites is mostly done using the classification
techniques based on machine learning or data mining. Many algorithms have been used for …
techniques based on machine learning or data mining. Many algorithms have been used for …
Attacks and Security Schemes in Cloud Computing: A Survey
P Jain, R Barskar, U Chourasia - Proceedings of the International …, 2022 - Springer
Cloud computing provides the virtual environment for users to access the hardware
resources and services. The resources such as storage, applications, services, networks …
resources and services. The resources such as storage, applications, services, networks …
Exploring vulnerabilities and mitigation strategies among high school students: A qualitative analysis study
M Akese, O Hussein - 2024 - diva-portal.org
Phishing attacks have emerged as a prominent cybersecurity threat, with one demographic
particularly vulnerable being high school students, who are often active on social media yet …
particularly vulnerable being high school students, who are often active on social media yet …