Works matching DE "PHISHING prevention"
Results: 152
Stopping Cyberattacks: Strategies for Dental Office Data Security.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2021, v. 42, n. 1, p. 11
- By:
- Publication type:
- Article
Intelligent phishing website detection using machine learning.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 19, p. 29431, doi. 10.1007/s11042-023-14731-4
- By:
- Publication type:
- Article
Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance.
- Published in:
- Journal of the Association for Information Systems, 2015, v. 16, n. 6, p. 448
- By:
- Publication type:
- Article
INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2024, v. 12, n. 2, p. 416, doi. 10.21923/jesd.1458955
- By:
- Publication type:
- Article
The Phish that Matters is Likely the One You Never Saw.
- Published in:
- ISSA Journal, 2024, v. 22, n. 7, p. 20
- By:
- Publication type:
- Article
Phishing Attacks Cybersecurity.
- Published in:
- ISSA Journal, 2022, v. 20, n. 8, p. 15
- By:
- Publication type:
- Article
Building a Phishing Program: Why Haven't You Started Yet?
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 28
- By:
- Publication type:
- Article
The Security Advice Magic Quadrant.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 7
- By:
- Publication type:
- Article
AUTHENTICATE ONCE AND BE DONE: USER-CENTRIC AUTHENTICATION THROUGH RICH DEVICE CAPABILITIES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- By:
- Publication type:
- Article
PHISHING AND E-COMMERCE: AN INFORMATION SECURITY MANAGEMENT PROBLEM.
- Published in:
- Journal of Defense Resources Management, 2016, v. 7, n. 1, p. 129
- By:
- Publication type:
- Article
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks.
- Published in:
- Future Internet, 2022, v. 14, n. 3, p. 82, doi. 10.3390/fi14030082
- By:
- Publication type:
- Article
AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 2, p. 248, doi. 10.3390/sym16020248
- By:
- Publication type:
- Article
Cyberattacks and Security of Cloud Computing: A Complete Guideline.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 11, p. 1981, doi. 10.3390/sym15111981
- By:
- Publication type:
- Article
A Novel Phishing Website Detection Model Based on LightGBM and Domain Name Features.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 1, p. 180, doi. 10.3390/sym15010180
- By:
- Publication type:
- Article
Cybercrime and Social Engineering.
- Published in:
- Advocate (05154987), 2018, v. 61, n. 9, p. 42
- By:
- Publication type:
- Article
Effective forewarning requires central route processing: Theoretical improvements on the counterargumentation hypothesis and practical implications for scam prevention.
- Published in:
- PLoS ONE, 2020, v. 14, n. 3, p. 1, doi. 10.1371/journal.pone.0229833
- By:
- Publication type:
- Article
Response to David R. Crocker and Steven D. Langton "When is it Legitimate to Downplay Individual Differences?".
- Published in:
- 2019
- By:
- Publication type:
- Letter to the Editor
PREVENTING SPOOFING: FROM CRIMINAL PROSECUTION TO SOCIAL NORMS.
- Published in:
- University of Cincinnati Law Review, 2016, v. 84, n. 4, p. 1069
- By:
- Publication type:
- Article
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance.
- Published in:
- Journal of Management Information Systems, 2020, v. 37, n. 1, p. 129, doi. 10.1080/07421222.2019.1705512
- By:
- Publication type:
- Article
Training to Mitigate Phishing Attacks Using Mindfulness Techniques.
- Published in:
- Journal of Management Information Systems, 2017, v. 34, n. 2, p. 597, doi. 10.1080/07421222.2017.1334499
- By:
- Publication type:
- Article
Editorial Introduction.
- Published in:
- Journal of Management Information Systems, 2017, v. 34, n. 2, p. 307, doi. 10.1080/07421222.2017.1334463
- By:
- Publication type:
- Article
Safety Management in the Age of Internet Threats.
- Published in:
- Management Systems in Production Engineering, 2019, v. 27, n. 2, p. 88, doi. 10.1515/mspe-2019-0015
- By:
- Publication type:
- Article
A Naturalistic Methodology for Assessing Susceptibility to Social Engineering Through Phishing.
- Published in:
- African Journal of Information Systems, 2019, v. 11, n. 3, p. 157
- By:
- Publication type:
- Article
Protecting Users against Phishing Attacks.
- Published in:
- Computer Journal, 2006, v. 49, n. 5, p. 554, doi. 10.1093/comjnl/bxh169
- By:
- Publication type:
- Article
The Weakest Link Against Cyberattacks: Understand that people are vulnerable.
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2021, v. 40, n. 1, p. 26
- By:
- Publication type:
- Article
Exploiting personality traits in social engineering attacks.
- Published in:
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2022, v. 32, n. 1, p. 113, doi. 10.33436/v32i1y202209
- By:
- Publication type:
- Article
The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 5, p. 324, doi. 10.1049/ise2.12073
- By:
- Publication type:
- Article
DETECTING FAKE WEBSITES: THE CONTRIBUTION OF STATISTICAL LEARNING THEORY.
- Published in:
- MIS Quarterly, 2010, v. 34, n. 3, p. 435, doi. 10.2307/25750686
- By:
- Publication type:
- Article
A Theoretical Framework for The Awareness of Phishing Attack.
- Published in:
- International Journal of Information & Knowledge Management (22318836), 2022, p. 126
- By:
- Publication type:
- Article
OptiPhishDetect: Optimized Phishing Detection through Learning based GCN with Scoring Model.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 6, p. 863, doi. 10.22266/ijies2023.1231.71
- By:
- Publication type:
- Article
Phishing and the Human Factor: Insights from a Bibliometric Analysis.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 10, p. 643, doi. 10.3390/info15100643
- By:
- Publication type:
- Article
Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 5, p. 208, doi. 10.3390/info12050208
- By:
- Publication type:
- Article
Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 12, p. 547, doi. 10.3390/info11120547
- By:
- Publication type:
- Article
Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 6, p. 309, doi. 10.3390/info11060309
- By:
- Publication type:
- Article
MEDIA IMPACT ON MOBILE PHISHING AVOIDANCE BEHAVIOR.
- Published in:
- Journal of Information System Security, 2024, v. 20, n. 3, p. 147
- By:
- Publication type:
- Article
SPEAR-PHISHING AND ITS SPECIFICS WITHIN SOCIAL ENGINEERING.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 379, doi. 10.2507/34th.daaam.proceedings.052
- By:
- Publication type:
- Article
A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks.
- Published in:
- Social Science Computer Review, 2023, v. 41, n. 1, p. 286, doi. 10.1177/08944393211046339
- By:
- Publication type:
- Article
The Twitter breach and the dangers of social engineering.
- Published in:
- Bench & Bar of Minnesota, 2020, v. 77, n. 8, p. 8
- By:
- Publication type:
- Article
Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 343
- By:
- Publication type:
- Article
Deep Learning-Based Efficient Model Development for Phishing Detection Using Random Forest and BLSTM Classifiers.
- Published in:
- Complexity, 2020, p. 1, doi. 10.1155/2020/8694796
- By:
- Publication type:
- Article
Spoofing detection on adaptive authentication System‐A survey.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2022, v. 11, n. 2, p. 87, doi. 10.1049/bme2.12060
- By:
- Publication type:
- Article
Securable networked scheme with face authentication.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2022, v. 11, n. 2, p. 97, doi. 10.1049/bme2.12056
- By:
- Publication type:
- Article
Face presentation attack detection. A comprehensive evaluation of the generalisation problem.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2021, v. 10, n. 4, p. 408, doi. 10.1049/bme2.12049
- By:
- Publication type:
- Article
Preventing face morphing attacks by using legacy face images.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2021, v. 10, n. 4, p. 430, doi. 10.1049/bme2.12047
- By:
- Publication type:
- Article
An exploratory study of interpretability for face presentation attack detection.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2021, v. 10, n. 4, p. 441, doi. 10.1049/bme2.12045
- By:
- Publication type:
- Article
Extended IMD2020: a large‐scale annotated dataset tailored for detecting manipulated images.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2021, v. 10, n. 4, p. 392, doi. 10.1049/bme2.12025
- By:
- Publication type:
- Article
Local feature encoding for unknown presentation attack detection: An analysis of different local feature descriptors.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2021, v. 10, n. 4, p. 374, doi. 10.1049/bme2.12023
- By:
- Publication type:
- Article
Detecting Phishing Website using Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 6580
- By:
- Publication type:
- Article
Detection of Phishing Website using Machine Learning.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 5252
- By:
- Publication type:
- Article
Cybersecurity Advancements: A Comprehensive Survey of Machine Learning-based Preprocessing Techniques for Enhanced Website Phishing Detection.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 4, p. 3453
- By:
- Publication type:
- Article