Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …
levels, including a vast array of programs and modules tailored to specific sectors of industry …
Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
A survey of phishing attack techniques, defence mechanisms and open research challenges
AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
An intelligent cyber security phishing detection system using deep learning techniques
Recently, phishing attacks have become one of the most prominent social engineering
attacks faced by public internet users, governments, and businesses. In response to this …
attacks faced by public internet users, governments, and businesses. In response to this …
Phishing in organizations: Findings from a large-scale and long-term study
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
Defending against phishing attacks: taxonomy of methods, current issues and future directions
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …
online banking, it has made people's lives more comfortable. Due the growth of Internet …
Security awareness of computer users: A phishing threat avoidance perspective
Phishing is an online identity theft, which aims to steal confidential information such as
username, password and online banking details from its victims. To prevent this, anti …
username, password and online banking details from its victims. To prevent this, anti …
A systematic review of multimedia tools for cybersecurity awareness and education
We conduct a comprehensive review covering academic publications and industry products
relating to tools for cybersecurity awareness and education aimed at non-expert end-users …
relating to tools for cybersecurity awareness and education aimed at non-expert end-users …
Got phished? Internet security and human vulnerability
A leading cause of security breaches is a basic human vulnerability: our susceptibility to
deception. Hackers exploit this vulnerability by sending phishing emails that induce users to …
deception. Hackers exploit this vulnerability by sending phishing emails that induce users to …
Why phishing still works: User strategies for combating phishing attacks
We have conducted a user study to assess whether improved browser security indicators
and increased awareness of phishing have led to users׳ improved ability to protect …
and increased awareness of phishing have led to users׳ improved ability to protect …