Ajayi et al., 2024 - Google Patents
Evaluation of Phishing Attack Strategies on Mobile Device UsersAjayi et al., 2024
View PDF- Document ID
- 12438382204769510672
- Author
- Ajayi A
- Olajide M
- Abiodun O
- Afolabi O
- Publication year
External Links
Snippet
Phishing is one of the most common types of hostile internet attacks, which are on the rise on a daily basis. Phishing is a deliberate act that uses deception to trick unsuspecting individuals into disclosing their personal information online. Phishing attacks change in size …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
- G06Q30/0269—Targeted advertisement based on user profile or attribute
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0242—Determination of advertisement effectiveness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chaudhry et al. | Phishing attacks and defenses | |
| Jahankhani et al. | Cybercrime classification and characteristics | |
| Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
| Chanti et al. | A literature review on classification of phishing attacks | |
| Huang et al. | Countermeasure techniques for deceptive phishing attack | |
| Arabia-Obedoza et al. | Social engineering attacks a reconnaissance synthesis analysis | |
| Patel et al. | A theoretical review of social media usage by cyber-criminals | |
| Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
| Afaq et al. | A critical analysis of cyber threats and their global impact | |
| Chaudhry et al. | Phishing: Classification and countermeasures | |
| Deliri et al. | Security and Privacy Issues in Social Networks. | |
| Ojugo et al. | Empirical evidence of socially-engineered attack menace among undergraduate smartphone users in selected Universities in Nigeria | |
| Tripathy | A comprehensive survey of cybercrimes in India over the last decade | |
| Okocha et al. | Online social networks misuse, cyber-crimes and counter-mechanisms in Nigeria | |
| Fadli et al. | Cyber attack awareness and prevention in network security | |
| Nelson et al. | Social engineering for security attacks | |
| Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
| Baadel et al. | Avoiding the phishing bait: The need for conventional countermeasures for mobile users | |
| Ajayi et al. | Evaluation of Phishing Attack Strategies on Mobile Device Users | |
| Khan | Implication of cyber warfare on the financial sector. An exploratory study | |
| Seth et al. | A comprehensive study of classification of phishing attacks with its AI/I detection | |
| Muppavaram et al. | How safe is your mobile app? mobile app attacks and defense | |
| Permana et al. | Personal Data Vulnerability in the Digital Era: Study of Modus Operandi and Mechanisms to Prevent Phishing Crimes | |
| Kaur et al. | A Review on Phishing Technique: Classification, Lifecycle and Detection Approaches | |
| Kaur et al. | Advanced tools and technologies for phishing prevention |