[HTML][HTML] The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign

A Chrysanthou, Y Pantis, C Patsakis - Computers & Security, 2024 - Elsevier
In an era dominated by digital interactions, phishing campaigns have evolved to exploit not
just technological vulnerabilities but also human traits. This study takes an unprecedented …

“Do Users Fall for Real Adversarial Phishing?” Investigating the Human Response to Evasive Webpages

A Draganovic, S Dambra, JA Iuit… - … on Electronic Crime …, 2023 - ieeexplore.ieee.org
Phishing websites are everywhere, and countermeasures based on static blocklists cannot
cope with such a threat. To address this problem, state-of-the-art solutions entail the …

[PDF][PDF] Generative adversarial network-based phishing URL detection with variational autoencoder and transformer

JK Sasi, A Balakrishnan - Int J Artif Intell, 2024 - researchgate.net
Phishing attacks pose a constant threat to online security, necessitating the development of
efficient tools for identifying malicious URLs. In this article, we propose a novel approach to …

What Makes Phishing Simulation Campaigns (Un) Acceptable? A Vignette Experiment on the Acceptance and Manipulation Intention Related to Phishing Simulation …

J Schwab, A Nußbaum, A Sergeeva, F Alt… - A Vignette Experiment on … - papers.ssrn.com
Organizations depend on their employees' long-term cooperation to protect themselves from
threats. The acceptance of cybersecurity training measures is thus crucial. Phishing attacks …