نتایج جستجو برای: phishing detection

تعداد نتایج: 567318  

2012
Jason Britt Brad Wardman Alan Sprague Gary Warner

Phishing websites attempt to deceive people to expose their passwords, user IDs and other sensitive information by mimicking legitimate websites such as banks, product vendors, and service providers. Phishing websites are a pervasive and ongoing problem. Examining and analyzing a phishing website is a good first step in an investigation. Examining and analyzing phishing websites can be a manual...

2007
Vivek Anandpara Andrew Dingman Markus Jakobsson Debin Liu Heather Roinestad

We argue that phishing IQ tests fail to measure susceptibility to phishing attacks. We conducted a study where 40 subjects were asked to answer a selection of questions from existing phishing IQ tests in which we varied the portion (from 25% to 100%) of the questions that corresponded to phishing emails. We did not find any correlation between the actual number of phishing emails and the number...

Journal: :International Journal on Semantic Web and Information Systems 2022

The phishing attack is one of the main cybersecurity threats in web and spear phishing. Phishing websites continue to be a problem. One contributions our study was working extracting URL & Domain Identity feature, Abnormal Features, HTML JavaScript Features as semantic features detect websites, which makes process classification using those features, more controllable effective. current use...

2007
John Aycock

Phishing is a widespread and effective computer-mediated social attack. Phishers have proven highly adaptable in terms of exploiting new communications channels – witness ‘vishing’ and ‘SMiShing’ – and are becoming increasingly sophisticated. At the same time, research has shown that current anti-phishing measures are less than adequate. One concern in terms of malicious software is targeted at...

Journal: :Telecom 2023

The recent progress in blockchain and wireless communication infrastructures has paved the way for creating blockchain-based systems that protect data integrity enable secure information sharing. Despite these advancements, concerns regarding security privacy continue to impede widespread adoption of technology, especially when sharing sensitive data. Specific attacks against blockchains, such ...

2006
Saeed Abu-Nimeh

There is no agreed upon definition for Phishing. Although, the medium of attack may vary, the goal is to steal confidential information from an individual. Classical Phishing attacks via mass mailing have a low return of investment rate. Generally, one mass mailing of 100,000 emails may collect between 10 to 100 victims. On the contrary, Phishing scams targeted to a specific group of people in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید