Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

Mobile phishing attacks and defence mechanisms: State of art and open research challenges

D Goel, AK Jain - Computers & Security, 2018 - Elsevier
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …

[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List

R Liu, Y Lin, X Teoh, G Liu, Z Huang… - 33rd USENIX Security …, 2024 - usenix.org
Phishing, a pervasive form of social engineering attack that compromises user credentials,
has led to significant financial losses and undermined public trust. Modern phishing …

Effective defense schemes for phishing attacks on mobile computing platforms

L Wu, X Du, J Wu - IEEE Transactions on Vehicular Technology, 2015 - ieeexplore.ieee.org
Recent years have witnessed the increasing threat of phishing attacks on mobile computing
platforms. In fact, mobile phishing is particularly dangerous due to the hardware limitations …

Detecting mobile application spoofing attacks by leveraging user visual similarity perception

L Malisa, K Kostiainen, S Capkun - Proceedings of the Seventh ACM on …, 2017 - dl.acm.org
Mobile application spoofing is an attack where a malicious mobile app mimics the visual
appearance of another one. A common example of mobile application spoofing is a phishing …

MP-shield: A framework for phishing detection in mobile devices

G Bottazzi, E Casalicchio, D Cingolani… - … on Computer and …, 2015 - ieeexplore.ieee.org
Today, there is an exponential growth of e-services requiring the exchange of personal and
sensible data over the Internet. Phishing techniques are emerging as the easiest solution to …

[PDF][PDF] Security threats on mobile devices and their effects: estimations for the future

M Yesilyurt, Y Yalman - International Journal of Security and Its …, 2016 - researchgate.net
Portable devices are today used in all areas of life thanks to their ease of use as well as their
applications with unique features. The increase in the number of users, however, also leads …

Security of smart banking applications in Slovakia

J Bucko - Journal of theoretical and applied electronic commerce …, 2017 - SciELO Chile
High growth of smartphones and tablets usage has brought enormous rise in the use of
newer form of electronic banking-Smart Banking, nowadays. This form of e-banking is …

On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach

M Masoud, Y Jaradat, AQ Ahmad - 2016 2nd International …, 2016 - ieeexplore.ieee.org
Web phishing attacks are one of the challenging security threats. Phishing depends on
humans' behavior but not protocols and devices vulnerabilities. In this work, software …