A comprehensive survey of phishing email detection and protection techniques

S Kumar Birthriya, AK Jain - Information Security Journal: A Global …, 2022 - Taylor & Francis
ABSTRACT E-Mails are commonly used as a medium of communication for personal and
pro-fessional purposes. Information shared via mail is also sensitive and private, such as …

Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

Z Wang, H Zhu, P Liu, L Sun - Cybersecurity, 2021 - Springer
Social engineering has posed a serious threat to cyberspace security. To protect against
social engineering attacks, a fundamental work is to know what constitutes social …

[PDF][PDF] Twitter fake account detection and classification using ontological engineering and semantic web rule language

M Jabardi, AS Hadi - Karbala International Journal of Modern Science, 2020 - iasj.net
Nowadays, Twitter has become one of the fastest-growing Online Social Networks (OSNs)
for data sharing frameworks and microblogging. It attracts millions of users worldwide where …

Design and application of an ontology to identify crop areas and improve land use

MA Riaño, AOR Rodriguez, JB Velandia, PAG García… - Acta Geophysica, 2023 - Springer
Agricultural development in Colombia has been characterized by being carried out in a local
and traditional way, where important basic aspects are not always considered for the best …

AntiPhiMBS-Auth: A new anti-phishing model to mitigate phishing attacks in mobile banking system at authentication level

TN Thakur, N Yoshiura - … , MobiSocial, and MUST, Taipei, Taiwan, April 11 …, 2021 - Springer
In the era of digital banking, the advent of the latest technologies, utilization of social media,
and mobile technologies became prime parts of our digital lives. Unfortunately, phishers …

Toward a phishing attack ontology

Í Oliveira, RF Calhau… - … Conference on Conceptual …, 2023 - research.utwente.nl
Phishing attacks are the most common form of social engineering where attackers intend to
deceive targeted people into revealing sensitive information or installing malware. To …

Социальная инженерия в кибербезопасности: примеры применения онтологии предметной области и графа знаний

ОА Минков, КС Верейкин - 2023 - elibrary.ru
Социальная инженерия представляет серьезную угрозу безопасности
киберпространства. Для защиты от атак социальной инженерии необходимо знать …

[图书][B] Staff Perceptions of Cybersecurity Threats

F Griffiths - 2021 - library.immaculata.edu
Cybersecurity incidents have risen over the past few years and continue to increase in
frequency and complexity. Unfortunately, educational institutions are not immune to threats …