Phishing attacks survey: Types, vectors, and technical approaches
R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …
Nudges for privacy and security: Understanding and assisting users' choices online
Advancements in information technology often task users with complex and consequential
privacy and security decisions. A growing body of research has investigated individuals' …
privacy and security decisions. A growing body of research has investigated individuals' …
A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …
Cyber security awareness, knowledge and behavior: A comparative study
Cyber-attacks represent a potential threat to information security. As rates of data usage and
internet consumption continue to increase, cyber awareness turned to be increasingly …
internet consumption continue to increase, cyber awareness turned to be increasingly …
A survey of phishing attack techniques, defence mechanisms and open research challenges
AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …
levels, including a vast array of programs and modules tailored to specific sectors of industry …
Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
Defending against phishing attacks: taxonomy of methods, current issues and future directions
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …
online banking, it has made people's lives more comfortable. Due the growth of Internet …
Phishing in organizations: Findings from a large-scale and long-term study
In this paper, we present findings from a largescale and long-term phishing experiment that
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
we conducted in collaboration with a partner company. Our experiment ran for 15 months …
Phishing environments, techniques, and countermeasures: A survey
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …
web, mobile, and social networking technologies. Previous phishing taxonomies have …