Academic literature on the topic 'Anti-phishing tools'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anti-phishing tools.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anti-phishing tools"
Sharma, Ishant, and Aman Kumar Sharma. "Anti-Phishing Tools: A Thorough Comparison of Features and Performance." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 478–82. http://dx.doi.org/10.22214/ijraset.2023.51502.
Full textChallacombe, Darin J., and Elizabeth N. McElhiney. "Phishing Susceptibility Among Healthcare Workers: The Impact of Awareness, Email Type, and Location." International Journal of Advanced Corporate Learning (iJAC) 18, no. 1 (2025): 4–15. https://doi.org/10.3991/ijac.v18i1.51671.
Full textGlăvan, Dragoș. "Detection of phishing attacks using the anti-phishing framework." Scientific Bulletin of Naval Academy XXIII, no. 1 (2020): 208–12. http://dx.doi.org/10.21279/1454-864x-20-i1-028.
Full textPurkait, Swapan. "Examining the effectiveness of phishing filters against DNS based phishing attacks." Information & Computer Security 23, no. 3 (2015): 333–46. http://dx.doi.org/10.1108/ics-02-2013-0009.
Full textDr., Rajendra Gupta. "AN STUDY OF SIMILARITY MEASUREMENT BETWEEN PHISHING AND LEGITIMATE WEBSITES USING BAYESIAN CLASSIFICATION AND ITS PERFORMANCE EVALUATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 2 (2017): 28–34. https://doi.org/10.5281/zenodo.266735.
Full textAndrushchak, I. "Andrushchak I.Ye. Features of the main directions, techniques and methods of protection against fishing at-tacks." COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, no. 47 (June 30, 2022): 5–9. http://dx.doi.org/10.36910/6775-2524-0560-2022-47-01.
Full textGupta, Rajendra, and Piyush Kumar Shukla. "Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System." International Journal of Computer Network and Information Security 7, no. 12 (2015): 70–77. http://dx.doi.org/10.5815/ijcnis.2015.12.08.
Full textNoah, Naheem, Abebe Tayachew, Stuart Ryan, and Sanchari Das. "PhisherCop: Developing an NLP-Based Automated Tool for Phishing Detection." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (2022): 2093–97. http://dx.doi.org/10.1177/1071181322661060.
Full textTepede Dipo. "Phishing Attacks among Internet Banking Users in Nigeria: An Exploration of Remedial Strategies." International Journal of Latest Technology in Engineering Management & Applied Science 13, no. 5 (2024): 122–29. http://dx.doi.org/10.51583/ijltemas.2024.130512.
Full textLappas, Dimitrios, Panagiotis Karampelas, and Giorgos Fesakis. "Enhancement of Phishing Email Detection with Bayesian Networks. A Cyber Security Training Module." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 328–37. https://doi.org/10.34190/eccws.24.1.3315.
Full textBook chapters on the topic "Anti-phishing tools"
Mavroeidis, Vasileios, and Mathew Nicho. "Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_25.
Full textNavaneeth, Jampula, Mosiur Rahaman, and Brij B. Gupta. "Anti-Phishing Technologies and Tools." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch007.
Full textKaur, Kashish Preet, Sunil K. Singh, Sudhakar Kumar, et al. "Advanced Tools and Technologies for Phishing Prevention." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch009.
Full textMuku, Abhavya, Sunil K. Singh, Sudhakar Kumar, et al. "Phishing Prevention Solutions and Mechanisms." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch003.
Full textPathak, Astha, Prashant Pandey, and Vaishali Raheja. "Comparing Different Machine Learning Techniques for Detecting Phishing Websites." In AI in the Social and Business World: A Comprehensive Approach. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815256864124010012.
Full textDelfino, Manuela. "Don’t Trash Your Spam!" In Handbook of Research on Didactic Strategies and Technologies for Education. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2122-0.ch070.
Full textMaharana, Narayana, Sudesh Kumar Kuppili, B. Udaya Bhaskar Ganesh, Girish Prasad Das, and Suman Kalyan Chaudhury. "From Defense to Deception." In Advances in Business Strategy and Competitive Advantage. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-7026-1.ch012.
Full textMohan, N., G. Rajasekar, and Ratno Agriyanto. "Anti-Fraud AI for Banking and FinTech Used in a Proactive Banking Strategy to Thwart SIM Phishing." In The Impact of AI Innovation on Financial Sectors in the Era of Industry 5.0. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-0082-4.ch010.
Full textConference papers on the topic "Anti-phishing tools"
Alqahtani, Saleh, and Priyadarsi Nanda. "Enhancing Phishing Resilience in Academia: The Mediating Role of Anti-Phishing Tools on Student Awareness and Behavior." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871376.
Full textAlqahtani, Saleh, and Priyadarsi Nanda. "Effects of Personal Characteristics on Phishing Awareness, Anti-Phishing Tool Usage, and Phishing Avoidance Behavior: A Structural Equation Modeling Approach." In 2024 17th International Conference on Security of Information and Networks (SIN). IEEE, 2024. https://doi.org/10.1109/sin63213.2024.10871302.
Full textZeydan, Hiba Zuhair, Ali Selamat, and Mazleena Salleh. "Survey of anti-phishing tools with detection capabilities." In 2014 International Symposium on Biometrics and Security Technologies (ISBAST). IEEE, 2014. http://dx.doi.org/10.1109/isbast.2014.7013124.
Full textRosser, Holly, Maylene Mayor, Adam Stemmler, Vinod Ahuja, Andrea Grover, and Matthew Hale. "Phish Finders: Crowd-powered RE for anti-phishing training tools." In 2022 IEEE 30th International Requirements Engineering Conference Workshops (REW). IEEE, 2022. http://dx.doi.org/10.1109/rew56159.2022.00031.
Full textFahmy, Hossam M. A., and Salma A. Ghoneim. "PhishBlock: A hybrid anti-phishing tool." In 2011 International Conference on Communications, Computing and Control Applications (CCCA). IEEE, 2011. http://dx.doi.org/10.1109/ccca.2011.6031523.
Full textAlnajim, Abdullah, and Malcolm Munro. "An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection." In 2009 International Conference on Intelligent Networking and Collaborative Systems (INCOS). IEEE, 2009. http://dx.doi.org/10.1109/incos.2009.37.
Full textAbbasi, Ahmed, Fatemeh Zahedi, and Yan Chen. "Impact of anti-phishing tool performance on attack success rates." In 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012). IEEE, 2012. http://dx.doi.org/10.1109/isi.2012.6282648.
Full text