[HTML][HTML] PhiDMA–A phishing detection model with multi-filter approach

G Sonowal, KS Kuppusamy - Journal of King Saud University-Computer …, 2020 - Elsevier
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal
sensitive information from victims by providing a fake site which looks like the visual clone of …

Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria

JT Okpa, BO Ajah, OF Nzeakor, E Eshiotse, TA Abang - Security Journal, 2023 - Springer
Although numerous studies on cybercrime have been undertaken, very little is known about
the BEC scam and its effects on economic sustainability in Nigeria. Using data collected via …

Knowledge Expansion and Counterfactual Interaction for {Reference-Based} Phishing Detection

R Liu, Y Lin, Y Zhang, PH Lee, JS Dong - 32nd USENIX Security …, 2023 - usenix.org
Phishing attacks have been increasingly prevalent in recent years, significantly eroding
societal trust. As a state-of-the-art defense solution, reference-based phishing detection …

A meta-analysis of field experiments on phishing susceptibility

T Sommestad, H Karlzén - 2019 APWG symposium on …, 2019 - ieeexplore.ieee.org
Phishing is a serious threat to any organization allowing their employees to use messaging
systems and computers connected to the internet. Consequently, researchers have …

Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system

GA Montazer, S ArabYarmohammadi - Applied Soft Computing, 2015 - Elsevier
Phishing is a method of stealing electronic identity in which social engineering and website
forging methods are used in order to mislead users and reveal confidential information …

What mid-career professionals think, know, and feel about phishing: Opportunities for university it departments to better empower employees in their anti-phishing …

AC Tally, J Abbott, A Bochner, S Das… - Proceedings of the ACM …, 2023 - dl.acm.org
Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are
used to trick recipients and acquire sensitive information for the purposes of committing …

A Review on Social Media Phishing: Factors and Countermeasures

J Chung, JZ Koay, YB Leau - … ACeS 2020, Penang, Malaysia, December 8 …, 2021 - Springer
With the rapid growth in the number of social media users, the reported cases of phishing
attack on social media are also increasing. Phishing is an attack that takes advantage of …

[PDF][PDF] Finding a pot of gold at the end of an internet rainbow: Further examination of fraudulent email solicitation.

J Nhan, P Kinkade, R Burns - International Journal of Cyber …, 2009 - cybercrimejournal.com
The amount of Internet spam has grown exponentially over the last decade. While much of
this unsolicited email is harmless advertising, a growing proportion of it is insidious in nature …

[PDF][PDF] Bank Emails: The Language of Legit and Scam

ST Vacalares, B Ana, DQ Dranto… - International Journal of …, 2024 - researchgate.net
Amidst the pandemic, the surge in unsolicited scam emails has made internet technology a
significant concern. Distinguishing between scams and authentic/legit emails has become …

Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria

JT Okpa, CU Ugwuoke, BO Ajah, E Eshiotse… - SAGE …, 2022 - journals.sagepub.com
Globally, e-commerce offers unlimited opportunities for corporate organizations to flourish as
its customers reside in all parts of the universe. However, given the fluid nature of the …