[go: up one dir, main page]

Ajayi et al., 2024 - Google Patents

Evaluation of Phishing Attack Strategies on Mobile Device Users

Ajayi et al., 2024

View PDF
Document ID
12438382204769510672
Author
Ajayi A
Olajide M
Abiodun O
Afolabi O
Publication year

External Links

Snippet

Phishing is one of the most common types of hostile internet attacks, which are on the rise on a daily basis. Phishing is a deliberate act that uses deception to trick unsuspecting individuals into disclosing their personal information online. Phishing attacks change in size …
Continue reading at ijsmr.in (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement
    • G06Q30/0269Targeted advertisement based on user profile or attribute
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0242Determination of advertisement effectiveness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Chaudhry et al. Phishing attacks and defenses
Jahankhani et al. Cybercrime classification and characteristics
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Chanti et al. A literature review on classification of phishing attacks
Huang et al. Countermeasure techniques for deceptive phishing attack
Arabia-Obedoza et al. Social engineering attacks a reconnaissance synthesis analysis
Patel et al. A theoretical review of social media usage by cyber-criminals
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Afaq et al. A critical analysis of cyber threats and their global impact
Chaudhry et al. Phishing: Classification and countermeasures
Deliri et al. Security and Privacy Issues in Social Networks.
Ojugo et al. Empirical evidence of socially-engineered attack menace among undergraduate smartphone users in selected Universities in Nigeria
Tripathy A comprehensive survey of cybercrimes in India over the last decade
Okocha et al. Online social networks misuse, cyber-crimes and counter-mechanisms in Nigeria
Fadli et al. Cyber attack awareness and prevention in network security
Nelson et al. Social engineering for security attacks
Elnaim et al. The current state of phishing attacks against Saudi Arabia university students
Baadel et al. Avoiding the phishing bait: The need for conventional countermeasures for mobile users
Ajayi et al. Evaluation of Phishing Attack Strategies on Mobile Device Users
Khan Implication of cyber warfare on the financial sector. An exploratory study
Seth et al. A comprehensive study of classification of phishing attacks with its AI/I detection
Muppavaram et al. How safe is your mobile app? mobile app attacks and defense
Permana et al. Personal Data Vulnerability in the Digital Era: Study of Modus Operandi and Mechanisms to Prevent Phishing Crimes
Kaur et al. A Review on Phishing Technique: Classification, Lifecycle and Detection Approaches
Kaur et al. Advanced tools and technologies for phishing prevention