Academic literature on the topic 'Phishing attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Phishing attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Phishing attack"
Rastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (2020): 2363. http://dx.doi.org/10.3390/app10072363.
Full textMohamed, Gori, J. Visumathi, Miroslav Mahdal, Jose Anand, and Muniyandy Elangovan. "An Effective and Secure Mechanism for Phishing Attacks Using a Machine Learning Approach." Processes 10, no. 7 (2022): 1356. http://dx.doi.org/10.3390/pr10071356.
Full textP.M, Dinesh, Mukesh M, Navaneethan B, Sabeenian R.S, Paramasivam M.E, and Manjunathan A. "Identification of Phishing Attacks using Machine Learning Algorithm." E3S Web of Conferences 399 (2023): 04010. http://dx.doi.org/10.1051/e3sconf/202339904010.
Full textNur, Sholihah Zaini, Stiawan Deris, Faizal Ab Razak Mohd, et al. "Phishing detection system using machine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 17, no. 3 (2020): 1165–71. https://doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Full textAl Ogaili, Riyadh Rahef Nuiaa, and Selvakumar Manickam. "A Critical Review: A New Taxonomy for Phishing Attacks Based on Phishing Techniques Used." Wasit Journal for Pure sciences 2, no. 2 (2023): 251–69. http://dx.doi.org/10.31185/wjps.143.
Full textAlsariera, Yazan A., Meshari H. Alanazi, Yahia Said, and Firas Allan. "An Investigation of AI-Based Ensemble Methods for the Detection of Phishing Attacks." Engineering, Technology & Applied Science Research 14, no. 3 (2024): 14266–74. http://dx.doi.org/10.48084/etasr.7267.
Full textJimmy, Fnu. "Phishing attackers: prevention and response strategies." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 307–18. http://dx.doi.org/10.60087/jaigs.v2i1.249.
Full textZaini, Nur Sholihah, Deris Stiawan, Mohd Faizal Ab Razak, et al. "Phishing detection system using nachine learning classifiers." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1165. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Full textDesai, Viraj, and Kavitha R. "Unveiling the Depths of Phishing: Understanding Tactics, Impacts, and Countermeasures." International Journal of Innovative Research in Science,Engineering and Technology 13, no. 05 (2024): 8596–600. http://dx.doi.org/10.15680/ijirset.2024.1305331.
Full textWahyuni, Ni Komang Arista Tri, Putu Putri Cahayani, I Gusti Ngurah Yogi Wicaksana, and Ida Ayu Kadek Bintang Wijayanti. "ANALISIS KERENTANAN KEJAHATAN ONLINE PHISING MENGGUNAKAN TOOLS ZPHISHER, SHELLPHISH DAN WHPHISHER." Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 3, no. 1 (2023): 23–31. http://dx.doi.org/10.55606/teknik.v3i1.915.
Full textDissertations / Theses on the topic "Phishing attack"
Bian, Kaigui. "New Approaches for Ensuring User Online Privacy." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/35972.
Full textLoreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.
Full textAhmed, Olfet, and Nawar Saman. "Utvärdering av nätverkssäkerheten på J Bil AB." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123403.
Full textDong, Xun. "Defending against phishing attacks." Thesis, University of York, 2009. http://etheses.whiterose.ac.uk/2215/.
Full textPersson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.
Full textNordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.
Full textHenshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.
Full textLe, Page Sophie. "Understanding the Phishing Ecosystem." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39385.
Full textFloderus, Sebastian, and Linus Rosenholm. "An educational experiment in discovering spear phishing attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446.
Full textKuo, Chuan-Chi. "Multi-layered regulation of phishing attacks : a Taiwan case study." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/67171/.
Full textBooks on the topic "Phishing attack"
Atkins, Mr Christopher. Phishing Attacks: Advanced Attack Techniques. CreateSpace Independent Publishing Platform, 2018.
Find full textPhishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks. Apress L. P., 2021.
Find full textMauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.
Full textCybersecurity Threats, Malware Trends, and Strategies: Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks. Packt Publishing, Limited, 2020.
Find full textHow to Remove Malwares from a Computer: A STEP by STEP GUIDE to REMOVE MALWARES THREATS,PHISHING and OTHER SOCIAL ENGINEERING ATTACKS. Independently Published, 2021.
Find full textHow to Remove Malwares from a Computer: A STEP by STEP GUIDE to REMOVE MALWARES THREATS, PHISHING and OTHER SOCIAL ENGINEERING ATTACKS. Independently Published, 2021.
Find full textBook chapters on the topic "Phishing attack"
Olaleye, Taiwo O., Oluwasefunmi T. Arogundade, Agbaegbu Johnbosco, et al. "Phishing Attack and Defense." In AI-Centric Modeling and Analytics. CRC Press, 2023. http://dx.doi.org/10.1201/9781003400110-17.
Full textTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4614-7163-9_348-1.
Full textSahoo, Bhaswati, and Prasant Kumar Pattnaik. "Cybersecurity Analysis and Phishing Attack." In Communication Technology and Gender Violence. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-45237-6_3.
Full textTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-6170-8_348.
Full textTheodoros, Tzouramanis, and Karampelas Loukas. "Online Social Network Phishing Attack." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_348.
Full textGallagher, Sean, Ben Gelman, Salma Taoufiq, et al. "Phishing and Social Engineering in the Age of LLMs." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_8.
Full textNaliniPriya, G., K. Damoddaram, G. Gopi, and R. Nitish Kumar. "Phishing Attack Detection Using Machine Learning." In Emerging Trends in Expert Applications and Security. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1946-8_27.
Full textNataraj, K. R., D. K. Yashaswini, R. Hema, Nayana S. Pawar, and S. Yashaswi. "Phishing Attack Detection Using Machine Learning." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2058-7_33.
Full textBuber, Ebubekir, Banu Diri, and Ozgur Koray Sahingoz. "NLP Based Phishing Attack Detection from URLs." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76348-4_59.
Full textAlghenaim, Mohammed Fahad, Nur Azaliah Abu Bakar, Fiza Abdul Rahim, Vanye Zira Vanduhe, and Gamal Alkawsi. "Phishing Attack Types and Mitigation: A Survey." In Data Science and Emerging Technologies. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0741-0_10.
Full textConference papers on the topic "Phishing attack"
J, Ranjani, Kamala B, Kalaiselvi VKG, Aishwarya R, and Abinaya A. "Phishing Attack Detector and Awareness Generator." In 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS). IEEE, 2024. https://doi.org/10.1109/icpects62210.2024.10780168.
Full textGoyal, Ashtha, Saksham Mittal, Sumit Negi, et al. "Phishing Attack Detection Using MapReduce and Machine Learning." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726226.
Full textKarthick Kumar, M., and N. Sivakumar. "URL Phishing attack Detection using Machine Learning Algorithms." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687804.
Full textGeetha, B., P. Malathi, T. Thirumalaikumari, V. Janakiraman, H. Anwer Basha, and S. Rukmani Devi. "Machine Learning Approaches for Proactive Phishing Attack Detection." In 2024 7th International Conference on Circuit Power and Computing Technologies (ICCPCT). IEEE, 2024. http://dx.doi.org/10.1109/iccpct61902.2024.10672638.
Full textKrishnaveni, A., and S. Balamurugan. "Phishing Attack Prediction using Several Machine Learning Techniques." In 2024 4th International Conference on Sustainable Expert Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63445.2024.10763142.
Full textPandey, Shivam, Prashant Priyadarshi, and Suman Devi. "Phishing attack Detection using NLP and Machine learning." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895895.
Full textGopal, S. B., Nanthiya D, Praveenkumar R, et al. "Examination of Phishing Attack Detection Using Machine Learning Techniques." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10723929.
Full textZhumabekova, Aidana, Vladislav Karyukin, Kuanysh Zhumabekova, et al. "The Comprehensive Deep Learning Models for Phishing Attack Detection." In 2024 20th International Asian School-Seminar on Optimization Problems of Complex Systems (OPCS). IEEE, 2024. http://dx.doi.org/10.1109/opcs63516.2024.10720441.
Full textLi, Haiwei, Jiahai Yang, Yuqi Li, and Kun Li. "Email phishing attack detection based on BERT transformer model." In International Conference on Optics, Electronics, and Communication Engineering, edited by Yang Yue. SPIE, 2024. http://dx.doi.org/10.1117/12.3049161.
Full textAlmalkawi, Islam T., Mohammad F. Al-Hammouri, Mohammed Abu Mallouh, and Tasneem Barakat. "Improving Email Security Through Machine Learning-Based Phishing Attack Detection." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847270.
Full textReports on the topic "Phishing attack"
Tamborello, Franklin P., and Kristen K. Greene. Exploratory lens model of decision-making in a potential phishing attack scenario. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.ir.8194.
Full text