Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
A survey of phishing attacks: Their types, vectors and technical approaches
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …
grown and evolved over the years as phishers are getting creative in planning and …
Phishing detection: analysis of visual similarity based approaches
AK Jain, BB Gupta - Security and Communication Networks, 2017 - Wiley Online Library
Phishing is one of the major problems faced by cyber‐world and leads to financial losses for
both industries and individuals. Detection of phishing attack with high accuracy has always …
both industries and individuals. Detection of phishing attack with high accuracy has always …
A systematic review on security of E-commerce systems
With the emergence of digitalization, making the use of Internet almost for everything is not a
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …
new trend. The maximum use of it is in the E-commerce systems. Most of the customers are …
A literature review on phishing crime, prevention review and investigation of gaps
AN Shaikh, AM Shabut… - 2016 10th international …, 2016 - ieeexplore.ieee.org
Phishing is a rapidly growing threat in cyber world and causing billions of dollars in damage
every year to internet users. It is an unlawful activity which uses a group of social …
every year to internet users. It is an unlawful activity which uses a group of social …
Dynamics of dark web financial marketplaces: An exploratory study of underground fraud and scam business
Abstract The number of Dark Web financial marketplaces where Dark Web users and sellers
actively trade illegal goods and services anonymously has been growing exponentially in …
actively trade illegal goods and services anonymously has been growing exponentially in …
[PDF][PDF] Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors
T Nagunwa - International Journal of Cyber-Security and Digital …, 2014 - Citeseer
Increased consumer anti-phishing awareness and improved anti-spam technologies has
gradually reduced the impact of traditional phishing spams in recent years. To keep up their …
gradually reduced the impact of traditional phishing spams in recent years. To keep up their …
Importance of coping with cyber security challenges in e commerce business
D Mitra, P Kulkarni, P Pathak… - … for Sustainability (IIHC), 2022 - ieeexplore.ieee.org
E-commerce is a platform where customers and firms meet on the internet to buy and sell
things. It is transforming the way people transact from the comfort of home at a mouse click …
things. It is transforming the way people transact from the comfort of home at a mouse click …
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks
G Varshney, M Misra, P Atrey - Journal of Information Security and …, 2018 - Elsevier
Securing user credentials against phishing attacks is an important and challenging research
problem. These days phishing is carried out by real time (RT) and control relay (CR) man in …
problem. These days phishing is carried out by real time (RT) and control relay (CR) man in …
[PDF][PDF] Exploring millennials' malware awareness and intention to comply with information security policy
K Wipawayangkool, E Villafranca - Review of Integrative Business …, 2015 - sibresearch.org
Despite the importance of security awareness, our understanding of its nature is limited,
because its operationalization in extant research has mostly been too broad. This paper …
because its operationalization in extant research has mostly been too broad. This paper …