Journal articles on the topic 'Phishing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Phishing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jansson, K., and R. von Solms. "Phishing for phishing awareness." Behaviour & Information Technology 32, no. 6 (June 2013): 584–93. http://dx.doi.org/10.1080/0144929x.2011.632650.
Full textBrenner, Philip S. "Can Phishing Tank Survey Response Rates? Evidence from a Natural Experiment." Field Methods 31, no. 4 (September 11, 2019): 295–308. http://dx.doi.org/10.1177/1525822x19872443.
Full textIdna Idris, Mohd Yamani, Madihah Mohd Saudi, Shaharudin Ismail, and Emran Mohd Tamil. "Phishing." International Journal of Learning: Annual Review 12, no. 8 (2007): 79–88. http://dx.doi.org/10.18848/1447-9494/cgp/v14i08/45418.
Full textFox, Dirk. "Phishing." Datenschutz und Datensicherheit - DuD 45, no. 11 (November 2021): 717. http://dx.doi.org/10.1007/s11623-021-1521-3.
Full textGandhi, V. Karamchand, and Prof R. Senthil Kumar. "A Study on Phishing: Preventions and Anti-Phishing Solutions." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 68–69. http://dx.doi.org/10.15373/22778179/jul2012/21.
Full textFatima, Rubia, Affan Yasin, Lin Liu, and Jianmin Wang. "How persuasive is a phishing email? A phishing game for phishing awareness." Journal of Computer Security 27, no. 6 (October 11, 2019): 581–612. http://dx.doi.org/10.3233/jcs-181253.
Full textZieni, Rasha, Luisa Massari, and Maria Carla Calzarossa. "Phishing or Not Phishing? A Survey on the Detection of Phishing Websites." IEEE Access 11 (2023): 18499–519. http://dx.doi.org/10.1109/access.2023.3247135.
Full textMohamed, Gori, J. Visumathi, Miroslav Mahdal, Jose Anand, and Muniyandy Elangovan. "An Effective and Secure Mechanism for Phishing Attacks Using a Machine Learning Approach." Processes 10, no. 7 (July 12, 2022): 1356. http://dx.doi.org/10.3390/pr10071356.
Full textSingh, Kuldeep, Palvi Aggarwal, Prashanth Rajivan, and Cleotilde Gonzalez. "Training to Detect Phishing Emails: Effects of the Frequency of Experienced Phishing Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 453–57. http://dx.doi.org/10.1177/1071181319631355.
Full textKumari, Khushboo, and Feon Jaison. "Detection of URL Based Phishing Websites Using Machine Learning in Django Framework." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1151–53. http://dx.doi.org/10.22214/ijraset.2022.40828.
Full textCheena, Ms, and Dr S. Radha Rammohan. "Detection and Prevention of Phishing Attacks in DDoS Using Collaborative Learning Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 2 (February 28, 2023): 747–50. http://dx.doi.org/10.22214/ijraset.2023.48906.
Full textHURZHII, S. "Organizational and technical aspect of anti-phishing." INFORMATION AND LAW, no. 3(46) (September 5, 2023): 176–86. http://dx.doi.org/10.37750/2616-6798.2023.3(46).287251.
Full textGupta, Suraj Rakesh. "Review on Phishing Attack Detection using Recurrent Neural Network." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 185–88. http://dx.doi.org/10.22214/ijraset.2021.38756.
Full textWelk, Allaire K., Kyung Wha Hong, Olga A. Zielinska, Rucha Tembe, Emerson Murphy-Hill, and Christopher B. Mayhorn. "Will the “Phisher-Men” Reel You In?" International Journal of Cyber Behavior, Psychology and Learning 5, no. 4 (October 2015): 1–17. http://dx.doi.org/10.4018/ijcbpl.2015100101.
Full textDadkhah, Mehdi, Shahaboddin Shamshirband, and Ainuddin Wahid Abdul Wahab. "A hybrid approach for phishing web site detection." Electronic Library 34, no. 6 (November 7, 2016): 927–44. http://dx.doi.org/10.1108/el-07-2015-0132.
Full textMohd Zaharon, Nur Farhana, Mazurina Mohd Ali, and Suhaily Hasnan. "Factors Affecting Awareness of Phishing Among Generation Y." Asia-Pacific Management Accounting Journal 16, no. 2 (August 31, 2021): 409–44. http://dx.doi.org/10.24191/apmaj.v16i2-15.
Full textV, Mrs Pallavi K., Simran Banu H. Shirahatti, Soniya Devi T, Syed Owais Umair, and Syed Waseem Ahmed. "Phishing - A Common Cyber Menace to Combat." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 2307–10. http://dx.doi.org/10.22214/ijraset.2024.60283.
Full textPerrault, Evan K. "Using an Interactive Online Quiz to Recalibrate College Students’ Attitudes and Behavioral Intentions About Phishing." Journal of Educational Computing Research 55, no. 8 (March 23, 2017): 1154–67. http://dx.doi.org/10.1177/0735633117699232.
Full textRastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (March 30, 2020): 2363. http://dx.doi.org/10.3390/app10072363.
Full textAbbasi, Ahmed, David Dobolyi, Anthony Vance, and Fatemeh Mariam Zahedi. "The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites." Information Systems Research 32, no. 2 (June 2021): 410–36. http://dx.doi.org/10.1287/isre.2020.0973.
Full textP.M, Dinesh, Mukesh M, Navaneethan B, Sabeenian R.S, Paramasivam M.E, and Manjunathan A. "Identification of Phishing Attacks using Machine Learning Algorithm." E3S Web of Conferences 399 (2023): 04010. http://dx.doi.org/10.1051/e3sconf/202339904010.
Full textR, Gokul, and Felix M. Philip. "Phishing Detection." YMER Digital 21, no. 06 (June 15, 2022): 405–12. http://dx.doi.org/10.37896/ymer21.06/39.
Full textAgarwal, Naveen, Scott Renfro, and Arturo Bejar. "Phishing Forbidden." Queue 5, no. 5 (July 2007): 28–32. http://dx.doi.org/10.1145/1281881.1281890.
Full textJagatic, Tom N., Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. "Social phishing." Communications of the ACM 50, no. 10 (October 2007): 94–100. http://dx.doi.org/10.1145/1290958.1290968.
Full textLarcom, G., and A. J. Elbirt. "Gone phishing." IEEE Technology and Society Magazine 25, no. 3 (2006): 52–55. http://dx.doi.org/10.1109/mtas.2006.1700023.
Full textKnight, William. "Goin' phishing?" Infosecurity Today 1, no. 4 (July 2004): 36–38. http://dx.doi.org/10.1016/s1742-6847(04)00089-8.
Full textGrimes, Roger A. "Fighting phishing." Computer Fraud & Security 2019, no. 7 (July 2019): 20. http://dx.doi.org/10.1016/s1361-3723(19)30076-4.
Full textBrooks, Peter. "Phishing tips." New Scientist 192, no. 2577 (November 2006): 27. http://dx.doi.org/10.1016/s0262-4079(06)60968-8.
Full textElmaleh, Dan. "Phishing forbidden." Card Technology Today 19, no. 9 (September 2007): 12–13. http://dx.doi.org/10.1016/s0965-2590(07)70137-8.
Full textJohnson, Victor A. "Phishing Tripz." Journal of Digital Forensic Practice 1, no. 3 (September 2006): 153–55. http://dx.doi.org/10.1080/15567280600995717.
Full textButler, David J. "Phishing holidays." Tourism Economics 24, no. 6 (May 18, 2018): 690–700. http://dx.doi.org/10.1177/1354816618774484.
Full textDoke, Tanmay, Pranav Khismatrao, Vaibhav Jambhale, and Nilesh Marathe. "Phishing-Inspector: Detection & Prevention of Phishing Websites." ITM Web of Conferences 32 (2020): 03004. http://dx.doi.org/10.1051/itmconf/20203203004.
Full textHawa Apandi, Siti, Jamaludin Sallim, and Roslina Mohd Sidek. "Types of anti-phishing solutions for phishing attack." IOP Conference Series: Materials Science and Engineering 769 (June 9, 2020): 012072. http://dx.doi.org/10.1088/1757-899x/769/1/012072.
Full textT. Venkat Narayana Rao, Sreeja Reddy. "Investigation of Phishing Attacks and Means to Utilize Anti Phishing Techniques." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 2 (February 28, 2019): 05–10. http://dx.doi.org/10.17762/ijritcc.v7i2.5224.
Full textAnton, Guda, and Klishch Sergey. "Phishing like the first step to gaining access." System technologies 4, no. 147 (November 13, 2023): 141–54. http://dx.doi.org/10.34185/1562-9945-4-147-2023-13.
Full textDarem, A. "Anti-Phishing Awareness Delivery Methods." Engineering, Technology & Applied Science Research 11, no. 6 (December 11, 2021): 7944–49. http://dx.doi.org/10.48084/etasr.4600.
Full textChen, Shihan, Yixiang Lu, and Dong-Jie Liu. "Phishing Target Identification Based on Neural Networks Using Category Features and Images." Security and Communication Networks 2022 (December 6, 2022): 1–12. http://dx.doi.org/10.1155/2022/5653270.
Full textTang, Lizhen, and Qusay H. Mahmoud. "A Survey of Machine Learning-Based Solutions for Phishing Website Detection." Machine Learning and Knowledge Extraction 3, no. 3 (August 20, 2021): 672–94. http://dx.doi.org/10.3390/make3030034.
Full textTambe Ebot, Alain. "Using stage theorizing to make anti-phishing recommendations more effective." Information & Computer Security 26, no. 4 (October 8, 2018): 401–19. http://dx.doi.org/10.1108/ics-06-2017-0040.
Full textTambe Ebot, Alain. "How stage theorizing can improve recommendations against phishing attacks." Information Technology & People 32, no. 4 (August 5, 2019): 828–57. http://dx.doi.org/10.1108/itp-12-2017-0434.
Full textBaadel, Said, and Joan Lu. "Data Analytics: Intelligent Anti-Phishing Techniques Based on Machine Learning." Journal of Information & Knowledge Management 18, no. 01 (March 2019): 1950005. http://dx.doi.org/10.1142/s0219649219500059.
Full textO'Leary, Daniel E. "What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis." Journal of Information Systems 33, no. 3 (July 1, 2019): 285–307. http://dx.doi.org/10.2308/isys-52481.
Full textAkinyelu, Andronicus A., and Aderemi O. Adewumi. "Classification of Phishing Email Using Random Forest Machine Learning Technique." Journal of Applied Mathematics 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/425731.
Full textHarrison, Brynne, Elena Svetieva, and Arun Vishwanath. "Individual processing of phishing emails." Online Information Review 40, no. 2 (April 11, 2016): 265–81. http://dx.doi.org/10.1108/oir-04-2015-0106.
Full textAliyu, Mansur, Mukhtar U. Bagarawa, Abba N. Mu’azu, and Muhammad T. Umar. "Understanding phishing awareness among students in tertiary institutions and setting-up defensive mechanisms against the attackers." Caliphate Journal of Science and Technology 5, no. 1 (January 13, 2023): 22–31. http://dx.doi.org/10.4314/cajost.v5i1.4.
Full textLam, Nguyen Tung. "Developing a Framework for Detecting Phishing URLs using Machine Learning." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (November 13, 2021): 61–67. http://dx.doi.org/10.46338/ijetae1121_08.
Full textSohidul Islam, Md, Md Sajjad, Mohammad Mahmudul Hasan, and Mohammad Sakib Islam Mazumder. "Phishing Attack Detecting System Using DNS and IP Filtering." Asian Journal of Computer Science and Technology 12, no. 1 (April 22, 2023): 16–20. http://dx.doi.org/10.51983/ajcst-2023.12.1.3552.
Full textRaju, Mr B. Ravi, S. Sai likhitha, N. Deepa, and S. Sushma. "Survey on Phishing Websites Detection using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 2376–81. http://dx.doi.org/10.22214/ijraset.2022.42843.
Full textYang, Rundong, Kangfeng Zheng, Bin Wu, Chunhua Wu, and Xiujuan Wang. "Prediction of Phishing Susceptibility Based on a Combination of Static and Dynamic Features." Mathematical Problems in Engineering 2022 (May 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/2884769.
Full textShubhankar, Shubhankar, Siddhartha Bhaumik, and Prakash Biswagar. "Detection and Classification of Malicious Websites." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 1, 2021): 120–31. http://dx.doi.org/10.51201/jusst/21/05228.
Full text