SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

Can serious gaming tactics bolster spear-phishing and phishing resilience?: Securing the human hacking in Information Security

A Yasin, R Fatima, Z JiangBin, W Afzal… - Information and Software …, 2024 - Elsevier
Context: In the digital age, there is a notable increase in fraudulent activities perpetrated by
social engineers who exploit individuals' limited knowledge of digital devices. These actors …

"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features

H Shirazi, B Bezawada, I Ray - Proceedings of the 23nd ACM on …, 2018 - dl.acm.org
Phishing websites remain a persistent security threat. Thus far, machine learning
approaches appear to have the best potential as defenses. But, there are two main concerns …

How persuasive is a phishing email? A phishing game for phishing awareness

R Fatima, A Yasin, L Liu, J Wang - Journal of Computer …, 2019 - content.iospress.com
Objective: The objective of this study is to utilize serious game to: i) educate players
regarding phishing and spear-phishing attacks; ii) make aware and educate players …

Visualizing and interpreting rnn models in url-based phishing detection

T Feng, C Yue - Proceedings of the 25th ACM Symposium on Access …, 2020 - dl.acm.org
Existing studies have demonstrated that using traditional machine learning techniques,
phishing detection simply based on the features of URLs can be very effective. In this paper …

Cybersecurity Awareness Based on Software and E‐mail Security with Statistical Analysis

MA Alqahtani - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
The aim of this study is to discover the impact of software security and e‐mail security on
overall cybersecurity among the students of Imam Abdulrahman Bin Faisal University in …

Human risk factors in cybersecurity

T Cuchta, B Blackwood, TR Devine, RJ Niichel… - Proceedings of the 20th …, 2019 - dl.acm.org
Phishing emails present a serious threat to any institution, costing individuals and
companies millions of dollars every year in damages. This paper attempts to assess the …

PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network

M Wang, X Zang, J Cao, B Zhang, S Li - Computers & Security, 2024 - Elsevier
Phishing is one of the significant threats to cybersecurity today, especially when attackers
create Internationalized Domain Names (IDN) homographs to engage in phishing activities …

A Blockchain‐Oriented Framework for Cloud‐Assisted System to Countermeasure Phishing for Establishing Secure Smart City

N Kumar, V Goel, R Ranjan… - Security and …, 2023 - Wiley Online Library
The information that is saved in the cloud about users is protected by a number of different
safeguards in order to facilitate the development of smart cities. Phishing and other forms of …

PHISHGEM: a mobile game-based learning for phishing awareness

CO Tinubu, OJ Falana, EO Oluwumi… - Journal of Cyber …, 2023 - Taylor & Francis
Phishing attacks have become the most effective means of gaining unauthorized access to
confidential information in the cyberspace. Unfortunately, many Internet users cannot identify …