T Xu, P Rajivan - Information & Computer Security, 2023 - emerald.com
Purpose Distinguishing phishing emails from legitimate emails continues to be a difficult task for most individuals. This study aims to investigate the psycholinguistic factors associated …
The objective of the research was to establish data relating to underlying causes of human error which are the most common cause of information security incidents within a private …
Preventing workplace phishing depends on the actions of every employee, regardless of cybersecurity expertise. Based on 24 semi-structured interviews with mid-career office …
Визначено основні концепції, що формують основу інтегрованого моделювання поведінки антагоністичних агентів в системах кібербезпеки. Показано, що значною …
S Das, J Abbott, S Gopavaram, J Blythe… - … Cryptography and Data …, 2020 - Springer
Solutions to phishing have included training users, stand-alone warnings, and automatic blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk …
Online user presence has increased rapidly over the last few years, broadening the user base. With the rise in digital usage, we have also witnessed a rise in digital crimes, which …
A Aljohani, J Jones - Proceedings of the 2021 3rd International …, 2021 - dl.acm.org
Evaluating the effectiveness of defense technologies mandates the inclusion of a human element, specifically if these technologies target human cognition and emotions. One of the …
Existing models and methods of intrusion detection are mostly aimed at detecting intensive attacks, do not take into account the security of computer system resources and the …
J Ahmad, G Marino, SA Al-Mezel - Mathematics, 2021 - mdpi.com
F-contractions have inspired a branch of metric fixed point theory committed to the generalization of the classical Banach contraction principle. The study of these contractions …