A critical appraisal of contemporary cyber security social engineering solutions: Measures, policies, tools and applications

HA Aldawood, G Skinner - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Social engineering is one of the biggest threats organizations face today, as more and more
companies are adopting digitalization. This study presents a critical review of the existing …

Decentralized privacy: a distributed ledger approach

P Papadopoulos, N Pitropakis… - Handbook of Smart …, 2022 - Springer
Our world due to the technological progress became fast-paced and is constantly evolving,
thus changing every single day. Consequently, the most valuable asset on earth is not gold …

Mmsphid: a phoneme based phishing verification model for persons with visual impairments

G Sonowal, KS Kuppusamy - Information & Computer Security, 2018 - emerald.com
MMSPhiD: a phoneme based phishing verification model for persons with visual impairments |
Emerald Insight Books and journals Case studies Expert Briefings Open Access Publish with …

Typowriter: A tool to prevent typosquatting

I Ahmad, MA Parvez, A Iqbal - 2019 IEEE 43rd Annual …, 2019 - ieeexplore.ieee.org
Typosquatting is a form of internet cybersquatting generated from the mistakes (typos) made
by internet users while ty** a website address. It often leads the user to another …

Catchphish: model for detecting homographic attacks on phishing pages

LC Teixeira, JCG De Barros… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
The growth in the numbers of phishing attacks, along with the volume of successful frauds,
demonstrates vul-nerabilities of the protection tools and exposes the advance in the …

Automating domain squatting detection using representation learning

P Loyola, K Gajananan, H Kitahara… - … Conference on Big …, 2020 - ieeexplore.ieee.org
Registering altered domain names with the purpose of confusing users and conducting
malicious activities is one of the most widespread types of attacks on the Web, conforming a …

Domain name processing systems and methods

H Nguyen, A Mesdaq, K Dedon, M Fox… - US Patent …, 2020 - Google Patents
Disclosed is a domain filter capable of determining an n-gram distance between a seed
domain and each of a plurality of candidate domains. The domain filter loads a seed domain …

Fast and accurate typosquatting domains evaluation with siamese networks

J Ya, T Liu, Q Li, P Lv, J Shi… - MILCOM 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
Typosquatting is a form of cybersquatting, which is a practice of registering typosquatting
domain names that closely resemble legitimate and popular ones. It has become a serious …

[PDF][PDF] Detecting cybersquatting-based business email compromise

DJ Griffiths - 2022 - researchgate.net
Business email compromise (BEC) is a subset of phishing attacks that target employees of
organizations and uses social engineering techniques to convince victims that the emails …

Uma avaliação de comportamentos homográficos em ataques de phishing direcionados que exploram a suscetibilidade pela fidedignidade e sazonalidade

LC Teixeira, CMR da Silva, BJT Fernandes… - Simpósio Brasileiro de …, 2021 - sol.sbc.org.br
O avanço de ataques de phishing não se caracteriza apenas na propagação, mas também
no rigor em detalhes, tornando a fraude cada vez mais convincente ao crivo do usuário …