68   Artículos

 
en línea
Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey and Kuo-Chu Chang    
Phishing attacks represent a significant and growing threat in the digital world, affecting individuals and organizations globally. Understanding the various factors that influence susceptibility to phishing is essential for developing more effective str... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran    
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kunj Joshi, Chintan Bhatt, Kaushal Shah, Dwireph Parmar, Juan M. Corchado, Alessandro Bruno and Pier Luigi Mazzeo    
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the cha... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone    
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Sibel Kapan and Efnan Sora Gunal    
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tommy Nguyen, Garnet Yeates, Tony Ly and Umar Albalawi    
With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in security ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Brent Pethers and Abubakar Bello    
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Malak Al-Hassan, Bilal Abu-Salih and Ahmad Al Hwaitat    
The lack of regulations and oversight on Online Social Networks (OSNs) has resulted in the rise of social spam, which is the dissemination of unsolicited and low-quality content that aims to deceive and manipulate users. Social spam can cause a range of ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh    
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Padmalochan Panda, Alekha Kumar Mishra and Deepak Puthal    
The first and foremost task of a phishing-detection mechanism is to confirm the appearance of a suspicious page that is similar to a genuine site. Once this is found, a suitable URL analysis mechanism may lead to conclusions about the genuineness of the ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »