Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
An investigation of phishing awareness and education over time: When and how to best remind users
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …
organisations. However, their effectiveness over time and, correspondingly, appropriate …
Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis
Smartphone's popularity and their constant connectivity to the World Wide Web have made
these devices vulnerable to phishing and smishing attacks. Phishing is a practice of sending …
these devices vulnerable to phishing and smishing attacks. Phishing is a practice of sending …
User experiences of torpedo: Tooltip-powered phishing email detection
We propose a concept called TORPEDO to improve phish detection by providing just-in-time
and just-in-place trustworthy tooltips. These help people to identify phish links embedded in …
and just-in-place trustworthy tooltips. These help people to identify phish links embedded in …
Unpacking spear phishing susceptibility
We report the results of a field experiment where we sent to over 1200 university students an
email or a Facebook message with a link to (non-existing) party pictures from a non-existing …
email or a Facebook message with a link to (non-existing) party pictures from a non-existing …
Effectiveness of and user preferences for security awareness training methodologies
KF Tschakert, S Ngamsuriyaroj - Heliyon, 2019 - cell.com
Phishing is a primary vector used in cyber-attacks, and current technical measures are not
sufficient to reduce their success to an acceptable level. Empowering users to identify …
sufficient to reduce their success to an acceptable level. Empowering users to identify …
SmiDCA: an anti-smishing model with machine learning approach
G Sonowal, KS Kuppusamy - The Computer Journal, 2018 - academic.oup.com
Phishing has become a serious cyber-security issue, and it is spreading through various
media such as e-mail, SMS to capture the victim's critical profile information. Although many …
media such as e-mail, SMS to capture the victim's critical profile information. Although many …
Teaching phishing-security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer… - ICT Systems Security …, 2016 - Springer
Ever more processes of our daily lives are shifting into the digital realm. Consequently, users
face a variety of IT-security threats with possibly severe ramifications. It has been shown that …
face a variety of IT-security threats with possibly severe ramifications. It has been shown that …
[HTML][HTML] Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video
Phishing is one of the biggest security threats to organizations. Anti-phishing awareness
measures can improve phishing email detection rates. These measures need to be efficient …
measures can improve phishing email detection rates. These measures need to be efficient …