Gashi, 2023 - Google Patents
Phishing: A viral cyber threatGashi, 2023
View PDF- Document ID
- 17514060039429192917
- Author
- Gashi G
- Publication year
External Links
Snippet
The constant evolution of technology is beneficial for all of society in terms of healthcare, automation of tedious tasks, and raising mindfulness toward the global climate. Along with this constant evolution, cyber-crimes such as phishing evolves in parallel. To understand …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30522—Query processing with adaptation to user needs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
Hijji et al. | A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions | |
US12015639B2 (en) | Systems and methods for polluting phishing campaign responses | |
EP3815330B1 (en) | Enhanced techniques for generating and deploying dynamic false user accounts | |
Jahankhani et al. | Cybercrime classification and characteristics | |
US9971891B2 (en) | Methods, systems, and media for detecting covert malware | |
Pienta et al. | A taxonomy of phishing: Attack types spanning economic, temporal, breadth, and target boundaries | |
Ahmed et al. | PhishCatcher: client-side defense against web spoofing attacks using machine learning | |
Adu-Manu et al. | Phishing attacks in social engineering: a review | |
Gururaj et al. | Social Engineering in Cybersecurity: Threats and Defenses | |
Bundala | Cybercrime: Psychological Tricks and Computer Securities Challenges | |
Frumento et al. | The role of Social Engineering in evolution of attacks | |
Hegt | Analysis of current and future phishing attacks on internet banking services | |
Gashi | Phishing: A viral cyber threat | |
Shaw | Why phishing works and the detection needed to prevent it | |
Bharath et al. | Introduction to Social Engineering: The Human Element of Hacking | |
ThreatLab | Zscaler threatlabz 2023 phishing report | |
Wang | Mitigating phishing threats | |
Farrell | Phishing in the financial sector | |
Kanwar et al. | Foundations of Phishing Defense: Comprehensive Strategies for Digital Asset Protection | |
McAnulty | Phishing Attacks: A Plan to Educate Employees and Mitigate Risks | |
Fayyad-Kazan et al. | A Pilot Study to Assess the Success Rate of Email Scams by Phishing: Case in Lebanon | |
Mercuri | Enhancing Cybersecurity Awareness: mitigating phishing risks for employees in a small company | |
Baral | Building Confidence not to be Phished: Conceptualising User’s Self-Efficacy In Phishing Threat Avoidance Behaviour | |
Chaudhari et al. | Detection of SMS Fraudulent using ANN Algorithm |