Defending against phishing attacks: taxonomy of methods, current issues and future directions

BB Gupta, NAG Arachchilage, KE Psannis - Telecommunication Systems, 2018 - Springer
Internet technology is so pervasive today, for example, from online social networking to
online banking, it has made people's lives more comfortable. Due the growth of Internet …

A survey of phishing attacks: Their types, vectors and technical approaches

KL Chiew, KSC Yong, CL Tan - Expert Systems with Applications, 2018 - Elsevier
Phishing was a threat in the cyber world a couple of decades ago and still is today. It has
grown and evolved over the years as phishers are getting creative in planning and …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

Phishing detection: a literature survey

M Khonji, Y Iraqi, A Jones - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
This article surveys the literature on the detection of phishing attacks. Phishing attacks target
vulnerabilities that exist in systems due to the human factor. Many cyber attacks are spread …

Phishing environments, techniques, and countermeasures: A survey

A Aleroud, L Zhou - Computers & Security, 2017 - Elsevier
Phishing has become an increasing threat in online space, largely driven by the evolving
web, mobile, and social networking technologies. Previous phishing taxonomies have …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

Anti-phishing techniques–a review of Cyber Defense Mechanisms

P Sharma, B Dash, MF Ansari - International Journal of Advanced …, 2022 - papers.ssrn.com
Phishing has been a constant issue across the global community. The approach has
primarily been related to most attackers gaining access to sensitive information about users …

[HTML][HTML] Mitigation strategies against the phishing attacks: A systematic literature review

B Naqvi, K Perova, A Farooq, I Makhdoom… - Computers & …, 2023 - Elsevier
Phishing attacks are among the most prevalent attack mechanisms employed by attackers.
The consequences of successful phishing include (and are not limited to) financial losses …