Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

Phishing web site detection using diverse machine learning algorithms

A Zamir, HU Khan, T Iqbal, N Yousaf, F Aslam… - The Electronic …, 2020 - emerald.com
Purpose This paper aims to present a framework to detect phishing websites using stacking
model. Phishing is a type of fraud to access users' credentials. The attackers access users' …

"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features

H Shirazi, B Bezawada, I Ray - Proceedings of the 23nd ACM on …, 2018 - dl.acm.org
Phishing websites remain a persistent security threat. Thus far, machine learning
approaches appear to have the best potential as defenses. But, there are two main concerns …

O single {Sign-Off}, where art thou? An empirical analysis of single {Sign-On} account hijacking and session management on the web

M Ghasemisharif, A Ramesh, S Checkoway… - 27th USENIX Security …, 2018 - usenix.org
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a
personalized experience without the hassle of creating and managing accounts across …

Phishing suspiciousness in older and younger adults: The role of executive functioning

BE Gavett, R Zhao, SE John, CA Bussell, JR Roberts… - PloS one, 2017 - journals.plos.org
Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering
sensitive information, with such goals as financial or identity theft. The current study sought …

Design and evaluation of the highly insidious extreme phishing attacks

R Zhao, S John, S Karas, C Bussell, J Roberts, D Six… - Computers & …, 2017 - Elsevier
One of the most severe and challenging threats to Internet security is phishing, which uses
spoofed websites to steal users' passwords and online identities. Phishers mainly use …

Typosquat cyber crime attack detection via smartphone

Z Zulkefli, MM Singh, ARM Shariff… - Procedia Computer …, 2017 - Elsevier
A Smartphone is a multi-purpose device that can act as both mediums of communications
and entertainment due to the availability of various sensors and services, such as SMS, NFC …

AI-driven approach for robust real-time detection of zero-day phishing websites

T Nagunwa - … Journal of Information and Computer Security, 2024 - inderscienceonline.com
Existing solutions for detecting phishing websites mainly depend on a blacklist approach,
which has proven ineffective in detecting zero-day phishing websites in real-time. This study …

Cybercrime

P Thangamuthu, A Rathee, S Palanimuthu… - … of Criminal Activities …, 2020 - igi-global.com
Cybercrime is a computer-oriented crime where offences are committed against an
individual person or group of persons with a criminal intention to harm the victim either …