Journal articles on the topic 'Email phishing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Email phishing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nmachi, Wosah Peace, and Thomas Win. "Phishing Mitigation Techniques: A Literature Survey." International Journal of Network Security & Its Applications 13, no. 2 (March 31, 2021): 63–72. http://dx.doi.org/10.5121/ijnsa.2021.13205.
Full textBullee, Jan-Willem, Lorena Montoya, Marianne Junger, and Pieter Hartel. "Spear phishing in organisations explained." Information & Computer Security 25, no. 5 (November 13, 2017): 593–613. http://dx.doi.org/10.1108/ics-03-2017-0009.
Full textSingh, Kuldeep, Palvi Aggarwal, Prashanth Rajivan, and Cleotilde Gonzalez. "What makes phishing emails hard for humans to detect?" Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (December 2020): 431–35. http://dx.doi.org/10.1177/1071181320641097.
Full textMhaske-Dhamdhere, Vidya, and Sandeep Vanjale. "A novel approach for phishing emails real time classifica-tion using k-means algorithm." International Journal of Engineering & Technology 7, no. 1.2 (December 28, 2017): 96. http://dx.doi.org/10.14419/ijet.v7i1.2.9018.
Full textWelk, Allaire K., Kyung Wha Hong, Olga A. Zielinska, Rucha Tembe, Emerson Murphy-Hill, and Christopher B. Mayhorn. "Will the “Phisher-Men” Reel You In?" International Journal of Cyber Behavior, Psychology and Learning 5, no. 4 (October 2015): 1–17. http://dx.doi.org/10.4018/ijcbpl.2015100101.
Full textVerma, Priyanka, Anjali Goyal, and Yogita Gigras. "Email phishing: text classification using natural language processing." Computer Science and Information Technologies 1, no. 1 (May 1, 2020): 1–12. http://dx.doi.org/10.11591/csit.v1i1.p1-12.
Full textRastenis, Justinas, Simona Ramanauskaitė, Ivan Suzdalev, Kornelija Tunaitytė, Justinas Janulevičius, and Antanas Čenys. "Multi-Language Spam/Phishing Classification by Email Body Text: Toward Automated Security Incident Investigation." Electronics 10, no. 6 (March 12, 2021): 668. http://dx.doi.org/10.3390/electronics10060668.
Full textLawson, Patrick, Olga Zielinska, Carl Pearson, and Christopher B. Mayhorn. "Interaction of Personality and Persuasion Tactics in Email Phishing Attacks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1331–33. http://dx.doi.org/10.1177/1541931213601815.
Full textB, Manoj, and Fancy C. "Checksec Email Phishi Trasher Tool." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 363. http://dx.doi.org/10.14419/ijet.v7i4.6.28442.
Full textVishwanath, Arun, Brynne Harrison, and Yu Jie Ng. "Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility." Communication Research 45, no. 8 (February 10, 2016): 1146–66. http://dx.doi.org/10.1177/0093650215627483.
Full textCooper, Molly, Yair Levy, Ling Wang, and Laurie Dringus. "Subject matter experts’ feedback on a prototype development of an audio, visual, and haptic phishing email alert system." Online Journal of Applied Knowledge Management 8, no. 2 (December 29, 2020): 107–21. http://dx.doi.org/10.36965/ojakm.2020.8(2)107-121.
Full textAkinyelu, Andronicus A., and Aderemi O. Adewumi. "Classification of Phishing Email Using Random Forest Machine Learning Technique." Journal of Applied Mathematics 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/425731.
Full textLötter, André, and Lynn Futcher. "A framework to assist email users in the identification of phishing attacks." Information & Computer Security 23, no. 4 (October 12, 2015): 370–81. http://dx.doi.org/10.1108/ics-10-2014-0070.
Full textGreitzer, Frank L., Wanru Li, Kathryn B. Laskey, James Lee, and Justin Purl. "Experimental Investigation of Technical and Human Factors Related to Phishing Susceptibility." ACM Transactions on Social Computing 4, no. 2 (June 26, 2021): 1–48. http://dx.doi.org/10.1145/3461672.
Full textWang, Jingguo, Yuan Li, and H. Raghav Rao. "Overconfidence in Phishing Email Detection." Journal of the Association for Information Systems 17, no. 11 (November 2016): 759–83. http://dx.doi.org/10.17705/1jais.00442.
Full textPriestman, Ward, Tony Anstis, Isabel G. Sebire, Shankar Sridharan, and Neil J. Sebire. "Phishing in healthcare organisations: threats, mitigation and approaches." BMJ Health & Care Informatics 26, no. 1 (September 2019): e100031. http://dx.doi.org/10.1136/bmjhci-2019-100031.
Full textFatima, Rubia, Affan Yasin, Lin Liu, and Jianmin Wang. "How persuasive is a phishing email? A phishing game for phishing awareness." Journal of Computer Security 27, no. 6 (October 11, 2019): 581–612. http://dx.doi.org/10.3233/jcs-181253.
Full textDadvandipour, Samad, and Aadil Gani Ganie. "Analyzing and predicting spear-phishing using machine learning methods." Multidiszciplináris tudományok 10, no. 4 (2020): 262–73. http://dx.doi.org/10.35925/j.multi.2020.4.30.
Full textKikerpill, Kristjan, and Andra Siibak. "Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails." Masaryk University Journal of Law and Technology 13, no. 1 (June 30, 2019): 45–66. http://dx.doi.org/10.5817/mujlt2019-1-3.
Full textAnandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.
Full textAdewumi, Oluyinka Aderemi, and Ayobami Andronicus Akinyelu. "A hybrid firefly and support vector machine classifier for phishing email detection." Kybernetes 45, no. 6 (June 6, 2016): 977–94. http://dx.doi.org/10.1108/k-07-2014-0129.
Full textBergholz, André, Jan De Beer, Sebastian Glahn, Marie-Francine Moens, Gerhard Paaß, and Siehyun Strobel. "New filtering approaches for phishing email." Journal of Computer Security 18, no. 1 (January 1, 2010): 7–35. http://dx.doi.org/10.3233/jcs-2010-0371.
Full textRohini, P., and K. Ramya. "Phishing Email Filtering Techniques A Survey." International Journal of Computer Trends and Technology 17, no. 1 (November 25, 2014): 18–21. http://dx.doi.org/10.14445/22312803/ijctt-v17p105.
Full textIslam, Muhammad Nazrul, Tarannum Zaki, Md Sami Uddin, and Md Mahedi Hasan. "Security Threats for Big Data." International Journal of Information Communication Technologies and Human Development 10, no. 4 (October 2018): 1–18. http://dx.doi.org/10.4018/ijicthd.2018100101.
Full textZielinska, Olga A., Allaire K. Welk, Christopher B. Mayhorn, and Emerson Murphy-Hill. "A Temporal Analysis of Persuasion Principles in Phishing Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 765–69. http://dx.doi.org/10.1177/1541931213601175.
Full textMolinaro, Kylie A., and Matthew L. Bolton. "Using the Lens Model and Cognitive Continuum Theory to Understand the Effects of Cognition on Phishing Victimization." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 173–77. http://dx.doi.org/10.1177/1071181319631044.
Full textYang, Zhuorao, Chen Qiao, Wanling Kan, and Junji Qiu. "Phishing Email Detection Based on Hybrid Features." IOP Conference Series: Earth and Environmental Science 252 (July 9, 2019): 042051. http://dx.doi.org/10.1088/1755-1315/252/4/042051.
Full textAlmomani, Ammar, B. B. Gupta, Samer Atawneh, A. Meulenberg, and Eman Almomani. "A Survey of Phishing Email Filtering Techniques." IEEE Communications Surveys & Tutorials 15, no. 4 (2013): 2070–90. http://dx.doi.org/10.1109/surv.2013.030713.00020.
Full textA. Abdullah, Amina, Loay E. George, and J. Mohammed. "Email Phishing Detection System Using Neural Network." Research Journal of Information Technology 6, no. 3 (August 5, 2015): 39–43. http://dx.doi.org/10.19026/rjit.6.2164.
Full textMorovati, Kamran. "Detection of Phishing Emails with Email Forensic Analysis and Machine Learning Techniques." International Journal of Cyber-Security and Digital Forensics 8, no. 2 (2019): 98–107. http://dx.doi.org/10.17781/p002568.
Full textMohammed, Mazin Abed, Dheyaa Ahmed Ibrahim, and Akbal Omran Salman. "Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language." Journal of Intelligent Systems 30, no. 1 (January 1, 2021): 774–92. http://dx.doi.org/10.1515/jisys-2021-0045.
Full textBroadhurst, Roderic, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, and Yuguang Ipsen. "Phishing and Cybercrime Risks in a University Student Community." International Journal of Cybersecurity Intelligence and Cybercrime 2, no. 1 (February 1, 2019): 4–23. http://dx.doi.org/10.52306/02010219rzex445.
Full textALmomani, Ammar. "Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection “Zero-day” Phishing Email." Indian Journal of Science and Technology 6, no. 1 (January 20, 2013): 1–5. http://dx.doi.org/10.17485/ijst/2013/v6i1.18.
Full textYasin, Adwan, and Abdelmunem Abuhasan. "An Intelligent Classification Model for Phishing Email Detection." International Journal of Network Security & Its Applications 8, no. 4 (July 30, 2016): 55–72. http://dx.doi.org/10.5121/ijnsa.2016.8405.
Full textDerouet, Estelle. "Fighting phishing and securing data with email authentication." Computer Fraud & Security 2016, no. 10 (October 2016): 5–8. http://dx.doi.org/10.1016/s1361-3723(16)30079-3.
Full textPerrault, Evan K. "Using an Interactive Online Quiz to Recalibrate College Students’ Attitudes and Behavioral Intentions About Phishing." Journal of Educational Computing Research 55, no. 8 (March 23, 2017): 1154–67. http://dx.doi.org/10.1177/0735633117699232.
Full textShubhankar, Shubhankar, Siddhartha Bhaumik, and Prakash Biswagar. "Detection and Classification of Malicious Websites." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 1, 2021): 120–31. http://dx.doi.org/10.51201/jusst/21/05228.
Full textKumar, Abhishek, Jyotir Moy Chatterjee, and Vicente García Díaz. "A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 486. http://dx.doi.org/10.11591/ijece.v10i1.pp486-493.
Full textAli, Ghassan Ahmed. "Protecting Users from Phishing Email through Awareness and Training." Indian Journal of Science and Technology 12, no. 25 (July 1, 2019): 1–9. http://dx.doi.org/10.17485/ijst/2019/v12i25/145743.
Full textChowdhury, M. U., J. H. Abawajy, A. V. Kelarev, and T. Hochin. "Multilayer hybrid strategy for phishing email zero-day filtering." Concurrency and Computation: Practice and Experience 29, no. 23 (July 22, 2016): e3929. http://dx.doi.org/10.1002/cpe.3929.
Full textC.Tayade, Pranal, and Prof Avinash P.Wadhe. "Review Paper on Privacy Preservation through Phishing Email Filter." International Journal of Engineering Trends and Technology 9, no. 12 (March 25, 2014): 600–604. http://dx.doi.org/10.14445/22315381/ijett-v9p314.
Full textVolkamer, Melanie, Karen Renaud, Benjamin Reinheimer, and Alexandra Kunz. "User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn." Computers & Security 71 (November 2017): 100–113. http://dx.doi.org/10.1016/j.cose.2017.02.004.
Full textWang, Jingguo, Tejaswini Herath, Rui Chen, Arun Vishwanath, and H. Raghav Rao. "Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email." IEEE Transactions on Professional Communication 55, no. 4 (December 2012): 345–62. http://dx.doi.org/10.1109/tpc.2012.2208392.
Full textChen, Jing, Scott Mishler, and Bin Hu. "Conveying Automation Reliability and Automation Error Type An Empirical Study in the Cyber Domain." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (September 2018): 172–73. http://dx.doi.org/10.1177/1541931218621040.
Full textSarno, Dawn M., Joanna E. Lewis, Corey J. Bohil, and Mark B. Neider. "Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults." Human Factors: The Journal of the Human Factors and Ergonomics Society 62, no. 5 (June 25, 2019): 704–17. http://dx.doi.org/10.1177/0018720819855570.
Full textChou, Frank Kun-Yueh, Abbott Po-Shun Chen, and Vincent Cheng-Lung Lo. "Mindless Response or Mindful Interpretation: Examining the Effect of Message Influence on Phishing Susceptibility." Sustainability 13, no. 4 (February 4, 2021): 1651. http://dx.doi.org/10.3390/su13041651.
Full textLaksono, Eko, Achmad Basuki, and Fitra Bachtiar. "Optimization of K Value in KNN Algorithm for Spam and Ham Email Classification." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 4, no. 2 (April 20, 2020): 377–83. http://dx.doi.org/10.29207/resti.v4i2.1845.
Full textMishler, Scott, Cody Jeffcoat, and Jing Chen. "Effects of Anthropomorphic Phishing Detection Aids, Transparency Information, and Feedback on User Trust, Performance, and Aid Retention." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 183. http://dx.doi.org/10.1177/1071181319631351.
Full textAbdelhamid, Mohamed. "The Role of Health Concerns in Phishing Susceptibility: Survey Design Study." Journal of Medical Internet Research 22, no. 5 (May 4, 2020): e18394. http://dx.doi.org/10.2196/18394.
Full textGrzebielec, Szymon. "Analysis of the vulnerability of IT system users to a phishing attack." Journal of Computer Sciences Institute 15 (June 27, 2020): 164–67. http://dx.doi.org/10.35784/jcsi.2049.
Full text