To see the other types of publications on this topic, follow the link: Phishing and Anti-Phishing.

Dissertations / Theses on the topic 'Phishing and Anti-Phishing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 21 dissertations / theses for your research on the topic 'Phishing and Anti-Phishing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Mei, Yuanxun. "Anti-phishing system : Detecting phishing e-mail." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2089.

Full text
Abstract:
<p>Because of the development of the Internet and the rapid increase of the electronic commercial, the incidents on stealing the consumers' personal identify data and financial account credentials are becoming more and more common. This phenomenon is called phishing. Now phishing is so popular that web sites such as papal , eBay, MSN, Best Buy, and America Online are frequently spoofed by phishers. What’s more, the amount of the phishing sites is increasing at a high rate.</p><p>The aim of the report is to analyze different phishing phenomenon and help the readers to identify phishing attempts
APA, Harvard, Vancouver, ISO, and other styles
2

Alnajim, Abdullah M. "Fighting Internet fraud : anti-phishing effectiveness for phishing websites detection." Thesis, Durham University, 2009. http://etheses.dur.ac.uk/2149/.

Full text
Abstract:
Recently, the Internet has become a very important medium of communication. Many people go online and conduct a wide range of business. They can sell and buy goods, perform different banking activities and even participate in political and social elections by casting a vote online. The parties involved in any transaction never need to meet and a buyer can sometimes be dealing with a fraudulent business that does not actually exist. So, security for conducting businesses online is vital and critical. All security-critical applications (e.g. online banking login pages) that are accessed using th
APA, Harvard, Vancouver, ISO, and other styles
3

Leung, Chung-man Alvin. "An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leung, Chung-man Alvin, and 梁仲文. "An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nourian, Arash. "CASTLE: a social framework for collaborative anti-phishing databases." Thesis, McGill University, 2009. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66989.

Full text
Abstract:
A Phishing attack is a type of identity theft attempting to steal confidential and personal data like Credit Card or banking account information. Different approaches have been proposed to defeat phishing attacks. Most of the approaches rely on a database lookup approach. In this thesis, we present a framework called CASTLE that allows a collaborative approach to build and maintain the databases containing information needed for anti-phishing services. We provide the full design and discuss how phishing sites can be captured using CASTLE. A prototype of this social frame- wor
APA, Harvard, Vancouver, ISO, and other styles
6

Pettersson, Rickard. "En studie om hur väl svenska internetanvändare upptäcker phishing på svenska jämfört med engelska." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18957.

Full text
Abstract:
Denna studie har undersökt ett relativt outforskat område inom phishing; språkets inverkan på människors mottaglighet för phishing. Syftet med studien var att undersöka hur stor skillnaden är mellan hur bra svenska Internetanvändare kan upptäcka phishing-mejl på svenska jämfört med engelska. För detta ändamål skapades en webbenkät med 32 mejl på både svenska och engelska. De 32 mejlen delades in i fyra lika stora grupper baserat på mejlets typ och språk. Deltagarna blev sedan tillfrågade att kategorisera mejlen som antingen legitima eller phishing. Målgruppen för studien bestod av Internetanvä
APA, Harvard, Vancouver, ISO, and other styles
7

Karlsson, Nicklas. "System för att upptäcka Phishing : Klassificering av mejl." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2073.

Full text
Abstract:
<p>Denna rapport tar en titt på phishing-problemet, något som många har råkat ut för med bland annat de falska Nordea eller eBay mejl som på senaste tiden har dykt upp i våra inkorgar, och ett eventuellt sätt att minska phishingens effekt. Fokus i rapporten ligger på klassificering av mejl och den huvudsakliga frågeställningen är: ”Är det, med hög träffsäkerhet, möjligt att med hjälp av ett klassificeringsverktyg sortera ut mejl som har med phishing att göra från övrig skräppost.” Det visade sig svårare än väntat att hitta phishing mejl att använda i klassificeringen. I de klassificeringar som
APA, Harvard, Vancouver, ISO, and other styles
8

Hamdani, Kamran Javed, and Muhammad Ijaz E. Mustafa. "Effectiveness of Online Anti-Phishing Delivery methods in raising Awareness among Internet Users." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-84318.

Full text
Abstract:
ABSTRACT  Cyberattacks are constantly evolving and phishing activities have risen steeply in the last few years. As the number of online users is increasing so as the phishing attacks and scams are increasing too. It is even more surprising in the presence of the most sophisticated technical security measures and online users are continually becoming the victim of phishing attacks that causing financial and emotional loss. Phishing attacks involve deceiving a target user into revealing their most important personal information such as ID, password, username, bank card, or other sensitive infor
APA, Harvard, Vancouver, ISO, and other styles
9

Corbelli, Sonia. "Reati informatici e sicurezza - come tutelarsi a livello tecnico e giuridico." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Find full text
Abstract:
La tesi ha l’obiettivo di rendere consapevoli gli utenti sul fatto che esistono dei rischi per la sicurezza e devono prendere delle contromisure per proteggere i loro dati. Ciò è stabilito anche dalla legge, che presta particolare attenzione a questo problema quando vengono trattati dati sensibili. Attualmente si occupa di questa tutela il Codice Privacy, ma è già entrato in vigore il regolamento europeo 2016/679, che lo sostituirà operativamente il 25/05/2018. Come prima forma di sicurezza si introduce la crittografia, a chiave simmetrica o a chiave pubblica, applicata in particolare alla fi
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Kai-Yuan, and 陳楷元. "Game-Based Anti-Phishing Training." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17093533951107503450.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>99<br>APWG Statistics shows that phishing attack is increasing and causing enormous economic loss. However, existing phishing detection tools still suffer from false alarms and false negative. Educating user to defense phishing attack is important. Users do not have motivation for reading traditional document-based education materials. Therefore, several anti-phishing games have been proposed. These games are not sufficient for user to learn the phishing knowledge with limited learning case. We need to generate a large item bank of phishing cases. However, it is c
APA, Harvard, Vancouver, ISO, and other styles
11

Chang, Shun-Shyan, and 張舜賢. "An Anti-Phishing User Authentication Mechanism." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/39480187846522786317.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>98<br>In this treacherous world, many attacks exist in the Internet we use every day, and phishing is one of the most common attacks we might face in our daily life. Nevertheless, the traditional password-based authentication is not remaining to defend users from these attacks. Not only phishing attack but dictionary attack is also a challenge for user authentication method. In this paper, we present the result of our experiment which contains different types of phishing attacks and defense methods. In addition, we point out the key factors of why the phishing attacks ar
APA, Harvard, Vancouver, ISO, and other styles
12

Yeh, Wei-Lin, and 葉瑋霖. "Anti Web Phishing Using Distinguishable Site Signatures." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/02193011048139109147.

Full text
Abstract:
碩士<br>國立臺灣海洋大學<br>資訊工程學系<br>98<br>Phishing is now a serious threat to the security of Internet users' confidential information. Basically, an attacker (phisher) tricks people into divulging sensitive information by sending fake messages to a large number of users at random. Unsuspecting users who follow the instruction in the messages are directed to well-built spoofed web pages and asked to provide sensitive information, which the phisher then steals. Statistics published by the anti-phishing working group (APWG) show that, at June 2009, the number of detected phishing web pages had increased
APA, Harvard, Vancouver, ISO, and other styles
13

Bergmann, Clemens, and Gamze Canova. "Design, Implementation and Evaluation of an Anti-Phishing Education App." Master's thesis, 2014. https://tuprints.ulb.tu-darmstadt.de/3763/1/master_thesis.pdf.

Full text
Abstract:
Scammers discover the Internet as a convenient place for their criminal activities. For instance, they send Internet users spoofed e-mails which link to fraudulent websites. These websites prompt visitors to enter their confidential data. This kind of Internet fraud is referred to as phishing. There exist multiple technical solutions to approach the problem of phishing which, for example, warn the users against accessing a revealed phishing website. Yet, they all cannot guarantee 100% accuracy since there will always be ways to circumvent these techniques. Moreover, security warnings or in
APA, Harvard, Vancouver, ISO, and other styles
14

Cheng, YU-Hong, and 鄭宇弘. "Anti-Phishing with Client-Server Cooperation -- Example by Online Transaction Website." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/v62zw7.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程學系碩士在職專班<br>97<br>Because the network online transaction is increasingly popular, many users encounter the phishing attack. The phisher usually use phishing mail and web spoofing to lure the victims. The victims don’t pay attention to the phisher’s trick, they leak their secret information to phisher. The victims often carelessly fall into the trap because of lacking of attention. In this thesis, we propose a Client-Server Cooperated Anti-Phishing method to detect phishing attacks. We use this method to strength the anti-phishing ability of a online transaction web site. T
APA, Harvard, Vancouver, ISO, and other styles
15

"Leveraging Scalable Data Analysis to Proactively Bolster the Anti-Phishing Ecosystem." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57029.

Full text
Abstract:
abstract: Despite an abundance of defenses that work to protect Internet users from online threats, malicious actors continue deploying relentless large-scale phishing attacks that target these users. Effectively mitigating phishing attacks remains a challenge for the security community due to attackers' ability to evolve and adapt to defenses, the cross-organizational nature of the infrastructure abused for phishing, and discrepancies between theoretical and realistic anti-phishing systems. Although technical countermeasures cannot always compensate for the human weakness exploited by social
APA, Harvard, Vancouver, ISO, and other styles
16

Kuo, Cian-Yu, and 郭芊妤. "Explore anti-phishing game-based learners’ sequential behavioral patterns, flow experience, and learning performance." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/92964687236644457555.

Full text
Abstract:
碩士<br>國立交通大學<br>教育研究所<br>103<br>The popularity of the Internet have provided users abundant information and easy access to communicate with each other, and therefore Internet users rely on it heavily. However, research showed that the consequences of the phishing attacks are often underestimated by the Internet users. In recent years, social networking sites (SNS) have become the new bases of phishing attacks. Because of the large population in SNS and the users’ attitude toward the Internet usage, SNS users are at a high risk of phishing attacks. The anti-phishing tools available on the curre
APA, Harvard, Vancouver, ISO, and other styles
17

Chu-Ling, Hsu, and 徐竹羚. "Evaluating anti-phishing performance with group-based DEA: an empirical study of universities in Taiwan." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/07283905182212527728.

Full text
Abstract:
碩士<br>國立花蓮教育大學<br>學習科技研究所<br>97<br>Phishing has enormous impact on profit as well as nonprofit organizations. This study aims to investigate anti-phishing performance of universities in Taiwan. Analyzing related information on web sites, we identify the input and output factors regarding anti-phishing investment of the organizations. Experts will grade these factors based on predefined criteria. Since subjective and imprecise judgment can be inevitable, experts’ assessments need to be compromised. This study proposes a Data Envelopment Analysis (DEA) model with multiple objectives for integrat
APA, Harvard, Vancouver, ISO, and other styles
18

Yu, Shih-Jou, and 游師柔. "The Effect of College Students' Internet Self-Efficacy on Their Anti-Phishing Behavior and Performance." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/78223936623971574852.

Full text
Abstract:
碩士<br>國立交通大學<br>教育研究所<br>102<br>Rapid technological developments along with the popularity of the Internet in recent years has led to an increase in Internet usage, and in turn the Internet users have to face the threat of the Internet fraud or phishing. Therefore, research related to anti-phishing becomes more important. Most of the recent anti-phishing research focused on system development or statistical reports. However, because prior studies indicated that the most important factor resulting in phishing scam is human’s psychological characteristics, which could be improved by training or
APA, Harvard, Vancouver, ISO, and other styles
19

Lee, Kuan-Hsien, and 李冠賢. "Teaching strategies of anti-phishing education: Evaluation of integrating the concept map approach into Tablet PCs to enhance student motivation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/82n296.

Full text
Abstract:
碩士<br>國立交通大學<br>理學院科技與數位學習學程<br>101<br>This research aims to investigate the effectiveness and feasibility of the teaching strategy for anti-phishing education, which integrates the concept map approach into tablet PCs to enhance student motivation. A total of 155 students from a junior high school in Taipei city participated in this study. After the students used tablet PCs and learned the basic concept of anti-phishing from the instructor, the students were randomly divided into the control and the experimental groups. In the experimental group, concept map instruction incorporated with tabl
APA, Harvard, Vancouver, ISO, and other styles
20

Yeh, Katherine Pin-Chen, and 葉品辰. "The Effects of Attention Monitoring with EEG Biofeedback on College Students’ Attention and Self-Efficacy: The Case of Anti-Phishing Instructional Materials." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/8j89mt.

Full text
Abstract:
碩士<br>國立交通大學<br>教育研究所<br>103<br>The purpose of this study was to investigate the effects of attention monitoring with EEG biofeedback on college students' attention and self-efficacy for learning. This study employed the quasi-experimental design, collecting both the qualitative and quantitative data. The instruments included the EEG sensor to collect learners’ attention levels, the focused attention scale, the selective attention scale, the self-efficacy scale from the MSLQ, the feedback acceptance scale, the anti-phishing achievement test, and an open-ended questionnaire. The participants we
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Ariel Yu-Zhen, and 陳俞蓁. "The Effects of Integrating Dynamic Concept Maps with IRS on Elementary School Students’ Motivation and Learning Outcome: The Case of Anti-Phishing Education." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/3ufxxv.

Full text
Abstract:
碩士<br>國立交通大學<br>教育研究所<br>103<br>The purpose of this study was to investigate the effects of integrating dynamic concept maps with IRS on elementary school students’ motivation and anti-phishing learning outcome. This study employed the quasi-experimental design. A total of 130 fifth-grade students participated in this study, divided into three groups: a control group (traditional image-text), an experimental group I (static concept maps), and an experimental group II (dynamic concept maps). The instruments included the MSLQ (the Motivated Strategies for Learning Questionnaire), consisting of s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!