Dissertations / Theses on the topic 'Phishing attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 38 dissertations / theses for your research on the topic 'Phishing attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bian, Kaigui. "New Approaches for Ensuring User Online Privacy." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/35972.
Full textLoreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.
Full textAhmed, Olfet, and Nawar Saman. "Utvärdering av nätverkssäkerheten på J Bil AB." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123403.
Full textDong, Xun. "Defending against phishing attacks." Thesis, University of York, 2009. http://etheses.whiterose.ac.uk/2215/.
Full textPersson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.
Full textNordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.
Full textHenshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.
Full textLe, Page Sophie. "Understanding the Phishing Ecosystem." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39385.
Full textFloderus, Sebastian, and Linus Rosenholm. "An educational experiment in discovering spear phishing attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446.
Full textKuo, Chuan-Chi. "Multi-layered regulation of phishing attacks : a Taiwan case study." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/67171/.
Full textShargawi, Ayman. "Understanding the human behavioural factors behind online learners' susceptibility to phishing attacks." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/126296/.
Full textMcRae, Craig Michael. "Using Web bugs and honeytokens to investigate the source of phishing attacks." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-04012008-220800.
Full textTrevino, Alberto. "Improving Filtering of Email Phishing Attacks by Using Three-Way Text Classifiers." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3103.
Full textUtakrit, Nattakant. "Security awareness by online banking users in Western Australian of phishing attacks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/503.
Full textPalla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.
Full textRaqab, Alah. "GAINING MONITORING CAPABILITIES AND INSIGHTS INTO RESPONSES FROM PHISHING DATA." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397504041.
Full textJan, Steve T. K. "Robustifying Machine Learning based Security Applications." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.
Full textMaurer, Max-Emanuel [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Counteracting phishing through HCI : detecting attacks and warning users / Max-Emanuel Maurer. Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2014. http://d-nb.info/1051777089/34.
Full textLala, Darshan Magan. "An investigation into the prevalence and growth of phishing attacks against South African financial targets." Thesis, Rhodes University, 2016. http://hdl.handle.net/10962/3157.
Full textPeng, Peng. "A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/96401.
Full textCerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Full textCarlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.
Full textSalem, Omran S. A. "An Integrated Intelligent Approach to Enhance the Security Control of IT Systems. A Proactive Approach to Security Control Using Artificial Fuzzy Logic to Strengthen the Authentication Process and Reduce the Risk of Phishing." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/14863.
Full textRocha, Flores Waldo. "Shaping information security behaviors related to social engineering attacks." Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.
Full textTout, Hicham Refaat. "Measuring the Impact of email Headers on the Predictive Accuracy of Machine Learning Techniques." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/325.
Full textLikarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.
Full textLeithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.
Full textStalmans, Etienne Raymond. "DNS traffic based classifiers for the automatic classification of botnet domains." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1007739.
Full textChen, Yu-Hung, and 陳昱宏. "Intelligent Hybrid Learning Architecture for Cyber-Phishing Attack." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/6w29rj.
Full textWang, Wei-Ching, and 王崴擎. "WebView Phishing based on Android InputConnection: Attack and Countermeasure." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/h3p7at.
Full text徐宇松. "A Client-side Oriented Whitelist Policy Against Cross-site Scripting Attack and Phishing Attack." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/53757864958987393859.
Full textДикунський, Назар Григорович, та Nazar Hryhorovych Dykunskyi. "Розробка програмного забезпечення для виявлення фішингових вебсайтів". Bachelor's thesis, 2021. http://elartu.tntu.edu.ua/handle/lib/35533.
Full textLu, Zebin. "SECURE WEB APPLICATIONS AGAINST OFF-LINE PASSWORD GUESSING ATTACK: A TWO WAY PASSWORD PROTOCOL WITH CHALLENGE RESPONSE USING ARBITRARY IMAGES." 2013. http://hdl.handle.net/1805/3425.
Full textLin, Ting-Ching, and 林廷璟. "A Method of Detecting Phishing Attacks for Auction Sites." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/23h859.
Full textLee, Hsin-Hsiung, and 李新雄. "Exploring the Intention of Electronic Commerce Activity consider with Phishing Attacks by Theory of Planned Behavior View." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/51156789026615775962.
Full text(9187496), Priyanka Tiwari. "EXPLORING PHISHING SUSCEPTIBILITY ATTRIBUTABLE TO AUTHORITY, URGENCY, RISK PERCEPTION AND HUMAN FACTORS." Thesis, 2020.
Find full textNjotini, Mzukisi Niven. "E-crimes and e-authentication - a legal perspective." Thesis, 2016. http://hdl.handle.net/10500/21720.
Full textVan, Rensburg Kim Shandre Jansen. "The human element in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa." Thesis, 2017. http://hdl.handle.net/10500/22681.
Full text