Sign Up to like & get
recommendations!
1
Published in 2021 at "Enterprise Information Systems"
DOI: 10.1080/17517575.2021.1896786
Abstract: ABSTRACT Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so on. Researchers have developed various anti-phishing methods in recent years. However, the…
read more here.
Keywords:
survey;
survey phishing;
phishing attack;
phishing attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2897724
Abstract: The integration of industrial control systems (ICS) with information technologies offers not only convenience but also creates security problems, from public networks to ICS. Spear-phishing attacks account for a considerable proportion of such security incidents.…
read more here.
Keywords:
strategy;
phishing attack;
spear phishing;
defense ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2022.3168234
Abstract: Over the last few years, with the massive growth of smartphone technology and mobile Internet, the use of various online social networks (OSNs) have increased rapidly. This ever-growing use of social networks leverages cyber-attackers to…
read more here.
Keywords:
authentication;
authentication scheme;
phishing attack;
social networks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v23.i2.pp1146-1158
Abstract: Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One…
read more here.
Keywords:
attack;
comparative analysis;
fuzzy;
analysis metaheuristic ... See more keywords