Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …

[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment

BB Gupta, K Yadav, I Razzak, K Psannis… - Computer …, 2021 - Elsevier
In recent times, we can see a massive increase in the number of devices that are being
connected to the internet. These devices include but are not limited to smartphones, IoT, and …

An effective detection approach for phishing websites using URL and HTML features

A Aljofey, Q Jiang, A Rasool, H Chen, W Liu, Q Qu… - Scientific Reports, 2022 - nature.com
Today's growing phishing websites pose significant threats due to their extremely
undetectable risk. They anticipate internet users to mistake them as genuine ones in order to …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, IA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …

An effective phishing detection model based on character level convolutional neural network from URL

A Aljofey, Q Jiang, Q Qu, M Huang, JP Niyigena - Electronics, 2020 - mdpi.com
Phishing is the easiest way to use cybercrime with the aim of enticing people to give
accurate information such as account IDs, bank details, and passwords. This type of …

Defending against phishing attacks: taxonomy of methods, current issues and future directions

BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …