Phishing attacks: A recent comprehensive study and a new anatomy

Z Alkhalil, C Hewage, L Nawaf, I Khan - Frontiers in Computer Science, 2021 - frontiersin.org
With the significant growth of internet usage, people increasingly share their personal
information online. As a result, an enormous amount of personal information and financial …

Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

A Model-Driven Approach for Online Banking Application Using AngularJS Framework

D Ghelani, TK Hua, SKR Koduru - American Journal of Information Science …, 2022 - ajisat.org
Numerous web apps, such as online banking, gaming, and online ticket reservation, are
now used by people all over the world. Existing web apps feature a shell page that is …

Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, IA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …

Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems

T Miller, A Staves, S Maesschalck, M Sturdee… - International Journal of …, 2021 - Elsevier
Since the 1980s, we have observed a range of cyberattacks targeting Industrial Control
Systems (ICS), some of which have impacted elements of critical national infrastructure …

Phishing or not phishing? A survey on the detection of phishing websites

R Zieni, L Massari, MC Calzarossa - IEEE Access, 2023 - ieeexplore.ieee.org
Phishing is a security threat with serious effects on individuals as well as on the targeted
brands. Although this threat has been around for quite a long time, it is still very active and …

An investigation of phishing awareness and education over time: When and how to best remind users

B Reinheimer, L Aldag, P Mayer, M Mossano… - … Symposium on Usable …, 2020 - usenix.org
Security awareness and education programmes are rolled out in more and more
organisations. However, their effectiveness over time and, correspondingly, appropriate …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

S Smadi, N Aslam, L Zhang - Decision Support Systems, 2018 - Elsevier
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …

Phishing threat avoidance behaviour: An empirical investigation

NAG Arachchilage, S Love, K Beznosov - Computers in Human Behavior, 2016 - Elsevier
Phishing is an online identity theft that aims to steal sensitive information such as username,
password and online banking details from its victims. Phishing education needs to be …