Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …
information online. As a result, an enormous amount of personal information and financial …
Phishing in organizations: Findings from a large-scale and long-term study
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
Defending against phishing attacks: taxonomy of methods, current issues and future directions
BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …
online banking, it has made people's lives more comfortable. Due the growth of Internet …
Susceptibility to spear-phishing emails: Effects of internet user demographics and email content
Phishing is fundamental to cyber attacks. This research determined the effect of Internet user
age and email content such as weapons of influence (persuasive techniques that attackers …
age and email content such as weapons of influence (persuasive techniques that attackers …
[HTML][HTML] Exploring cybersecurity education and training techniques: A comprehensive review of traditional, virtual reality, and augmented reality approaches
Considering the alarming increase in cyberattacks and their potential financial implications,
the importance of cybersecurity education and training cannot be overstated. This paper …
the importance of cybersecurity education and training cannot be overstated. This paper …
Fighting against phishing attacks: state of the art and future challenges
BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …
Internet security. Today, phishing attack is one of the most common and serious threats over …
Phishing detection: a literature survey
M Khonji, Y Iraqi, A Jones - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
This article surveys the literature on the detection of phishing attacks. Phishing attacks target
vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread …
vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread …
Security awareness of computer users: A phishing threat avoidance perspective
NAG Arachchilage, S Love - Computers in human behavior, 2014 - Elsevier
Phishing is an online identity theft, which aims to steal confidential information such as
username, password and online banking details from its victims. To prevent this, anti …
username, password and online banking details from its victims. To prevent this, anti …