Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …
organizations' information and communication technology strategy and investment …
[HTML][HTML] Phishing attacks: A recent comprehensive study and a new anatomy
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …
information online. As a result, an enormous amount of personal information and financial …
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
In recent times, we can see a massive increase in the number of devices that are being
connected to the internet. These devices include but are not limited to smartphones, IoT, and …
connected to the internet. These devices include but are not limited to smartphones, IoT, and …
An effective detection approach for phishing websites using URL and HTML features
Today's growing phishing websites pose significant threats due to their extremely
undetectable risk. They anticipate internet users to mistake them as genuine ones in order to …
undetectable risk. They anticipate internet users to mistake them as genuine ones in order to …
A survey of phishing attack techniques, defence mechanisms and open research challenges
AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
Harnessing artificial intelligence capabilities to improve cybersecurity
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …
An effective phishing detection model based on character level convolutional neural network from URL
Phishing is the easiest way to use cybercrime with the aim of enticing people to give
accurate information such as account IDs, bank details, and passwords. This type of …
accurate information such as account IDs, bank details, and passwords. This type of …
Defending against phishing attacks: taxonomy of methods, current issues and future directions
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …
online banking, it has made people's lives more comfortable. Due the growth of Internet …
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …