Academic literature on the topic 'Phising email'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Phising email.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Phising email"

1

Putra Y, Vikran Fasyadhiyaksa. "Modus Operandi Tindak Pidana Phising Menurut UU ITE." Jurist-Diction 4, no. 6 (November 5, 2021): 2525. http://dx.doi.org/10.20473/jd.v4i6.31857.

Full text
Abstract:
AbstractPhishing is an act to commit fraud by tricking the target with the intention of stealing the target's account, by spreading broadcasts which are often carried out through fake emails with fake information that directs the target to a fake page to trap the target so that the perpetrator gets access to the victim's account. Phishing still has some obscurity, especially in the modus operandi of the perpetrator. Therefore, this research aims to analyze and explain the modus operandi of the criminal act of phishing according to the ITE Law. This research is a normative legal research. Because the writing of this research in seeking the truth in order to answer legal issues raised by the author uses secondary data to find legal rules, legal principles, and legal doctrines, and tends to image law as a perspective discipline, which means that only see the law from the point of view of the norms only, which of course is prescriptive. This approach uses a statute approach, a conceptual approach and a case approach.Keywords: Phishing Crime; Cyber; Operandi Mode.AbstrakPhising adalah suatu perbuatan untuk melakukan penipuan dengan mengelabui target dengan maksud untuk mencuri akun target, dengan cara menyebarkan broadcast yang seringkali dilakukan melalui email palsu dengan muatan informasi palsu yang mengarahkan target ke halaman palsu untuk menjebak target sehingga pelaku mendapatkan akses terhadap akun korban, Secara ringkas Perbuatan phising masih memiliki beberapa kekaburan terutama pada modus operandi pelaku. Oleh karena itulah penelitian ini bertujuan untuk menganalisis dan menjelaskan terkait modus operandi Tindak pidana Phising menurut UU ITE. Penelitian ini merupakan penelitian hukum normatif. Karena penelitian ini dalam mencari kebenaran guna menjawab isu hukum yang diangkat penulis menggunakan data sekunder untuk menemukan suatu aturan-aturan hukum, prinsip-prinsip hukum, maupun doktrin-doktrin hukum, dan cenderung mencitrakan hukum sebagai disiplin prespektif, yang berarti hanya melihat hukum dari sudut pandang norma-normanya saja, yang tentunya bersifat preskriptif. Pendekatan ini menggunakan pendekatan undang-undang (statute approach), pendekatan konseptual (conceptual approach) dan pendekatan kasus (case approach). Kata Kunci: Tindak Pidana Phising; Siber; Modus Operandi.
APA, Harvard, Vancouver, ISO, and other styles
2

Irawan, Dedi. "MENCURI INFORMASI PENTING DENGAN MENGAMBIL ALIH AKUN FACEBOOK DENGAN METODE PHISING." JIKI (Jurnal llmu Komputer & lnformatika) 1, no. 1 (July 6, 2020): 43–46. http://dx.doi.org/10.24127/jiki.v1i1.671.

Full text
Abstract:
Phising bisa dikatakan mencuri informasi penting dengan mengambil alih akun korban untuk maksudtertentu. Kata lain dari Phising adalah Password Harvesting yang artinya sebuah tindakan kejahatanuntuk memancing mengumpulkan password. Tindakan Phising ini adalah mengarahkan penggunauntuk memasukkan data akun seperti username dan password di sebuah website palsu (fake webpage).Hebatnya lagi website Phising akan didesain dengan tampilan serta nuansa yang menyerupai situsaslinya (spoofed webpage). Misal seperti logo, alamat domain dan seterusnya. Sehingga jika tidakcermat mengamati, mereka yang menjadi target penjahat siber akan memberikan informasi merekaseperti username, password dan informasi penting lainnya secara sukarela. Salah satu metode palingumum yang digunakan untuk mendapatkan informasi terkait akun adalah metode "phising". Metodeini digunakan untuk menipu pengguna agar menyerahkan data mereka secara suka rela. Fake Webpagememang masih digunakan untuk mendapatkan akun social media seperti facebook. Hal tersebut karenapembuatan nya yang sangat mudah dan tingkat keberhasilan nya yang masih tinggi. Cara kerjanyaadalah dengan mengirimkan tautan (link) phising facebook di media social atau langsungmengirimkan link tersebut ke target. Bagi pengguna awam, mengira bahwa itu adalah situs webfacebook yang asli sehingga memasukkan username dan password, situs web sedang mengirimkaninformasi yang diterima dari pengguna seperti user name dan pasword ini ke pelaku, yaitu hacker.Setelah pelaku mendapatkan user name, email dan password korban maka akun korban akandigunakan untuk hal yang tidak baik.
APA, Harvard, Vancouver, ISO, and other styles
3

Aminudin, Aminudin, and Eko Budi Cahyono. "KORELASI TIME TO LIVE TERHADAP QUERY TIDAK NORMAL PADA DNS MENGGUNAKAN BINARY LOGISTIC REGRESSION." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 7, no. 2 (April 1, 2021): 143–50. http://dx.doi.org/10.33330/jurteksi.v7i2.924.

Full text
Abstract:
Abstract: DNS plays a vital role in the operation of services on the internet. Almost all services on the internet are under DNS control, such as email, FTP, web apps, etc. So, it is not surprising that various malicious activities involve DNS services such as financial fraud, phishing, malware, and malicious activity, etc. Fortunately, in DNS there is a record with the name time to live which can be used to detect a query or the address accessed from the user is a normal query or an abnormal query. Therefore, the purpose of this study is to determine the correlation value between time to live and abnormal queries on passive DNS data using the Binary Logistic Regression model. The results showed that the Binary Logistic Regression method could model the correlation between TTL, elapsed, and bytes which have an optimal model F1 Score of 0.9997 and also have a condition close to the ideal state by using the Precision-Recall Curve (PRC) graph plot. Keywords: Binary Logistic Regression; DNS Passive; Precision-Recall Curve (PRC); Query Abnormal Abstrak: DNS memegang peranan yang vital di dalam berjalanya service di internet. Hampir seluruh layanan di internet berada di bawah kendali DNS seperti email, ftp, app web dll. Jadi, tidak mengherankan bahwa berbagai kegiatan jahat melibatkan layanan DNS seperti financial fraud, phising, malware dan aktivitas malicious dll. Untungnya, di dalam DNS tersimpan sebuah record dengan nama time to live yang dapat digunakan untuk mendeteksi sebuah query atau alamat yang diakses dari user tersebut bersifat query normal atau query tidak normal. Oleh karena itu, tujuan penelitian ini adalah untuk mengetahui nilai korelasi antara time to live dengan query tidak normal pada data passive DNS dengan menggunakan model Binary Logistic Regression. Hasil penelitian menunjukkan bahwa metode Binary Logistic Regression dapat memodelkan korelasi antara TTL, elapsed dan bytes yang memiliki model optimal F1 Score sebesar 0.9997 dan juga memiliki kondisi hampir mendekati keadaan ideal dengan menggunakan plot grafik Precision Recall Curve (PRC). Kata kunci: Binary Logistic Regression; DNS Passive; Precision-Recall Curve (PRC); Query Abnormal
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Kuldeep, Palvi Aggarwal, Prashanth Rajivan, and Cleotilde Gonzalez. "What makes phishing emails hard for humans to detect?" Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (December 2020): 431–35. http://dx.doi.org/10.1177/1071181320641097.

Full text
Abstract:
This research investigates the email features that make a phishing email difficult to detect by humans. We use an existing data set of phishing and ham emails and expand that data set by collecting annotations of the features that make the emails phishing. Using the new, annotated data set, we perform cluster analyses to identify the categories of emails and their attributes. We then analyze the accuracy of detection in each category. Our results indicate that the similarity of the features of phishing emails to benign emails, play a critical role in the accuracy of detection. The phishing emails that are most similar to ham emails had the lowest accuracy while the phishing emails that were most dissimilar to the ham emails were detected more accurately. Regression models reveal the contribution of phishing email’s features to phishing detection accuracy. We discuss the implications of these results to theory and practice.
APA, Harvard, Vancouver, ISO, and other styles
5

Yustitiana, Rhesita. "Pelaksanaan Pengaturan Hukum Tindak Kejahatan “Fraud Phising” Transaksi Elektronik sebagai Bagian dari Upaya Penegakan Hukum di Indonesia Dikaitkan dengan Teori Efektivitas Hukum [Implementation of the Criminal Act of Fraud Phising of Electronic Transaction as Part of the Law Enforcement Effort in Indonesia in Regard to the Effectiveness of Law Theory]." Jurnal Hukum Visio Justisia 1, no. 1 (July 31, 2021): 98. http://dx.doi.org/10.19166/vj.v1i1.3802.

Full text
Abstract:
<p><em>Fraud phishing is a criminal act of electronic fraud that is conducted through false email addresses or websites with the intention to obtain private data of targets which leads to material or immaterial damages, not only felt by the targets but also by institutions related to criminal act fraud phishing on electronic transaction. Basically, Indonesia has proposed regulations related to the criminal act fraud phishing in electronic transaction. But, these regulations are not yet sufficient to decrease the number of Fraud Phishing cases in electronic transactions. Based on these problems, the Author argue that there is still a need to assess the legal arrangements for the crime of fraud phishing in electronic transactions, as well as the implementation of legal arrangements for electronic transactions fraud phishing as part of law enforcement efforts based on the theory of the effectiveness of law. This research uses two methods of legal research, which are normative and empirical legal research. The result of this research shows that Indonesia have 4 regulations about fraud phishing in electronic transactions, namely Law Number 11 of Year 2008 on Information and Electronic Transactions amended by Law Number 19 of Year 2016, Law Number 82 of Year 2012 on Electronic System and Transaction Electronic, the Indonesian Penal Code and Law Number 7 of Year 1992 on Banking amended by Law Number 10 of Year 1998, and the implementation of the regulations is still not effective if assessed using the theory of the effectiveness of law.</em></p><p><strong>Bahasa Indonesia Abstrak: </strong><em>Fraud Phishing</em> adalah tindak kejahatan penipuan elektronik yang dilakukan melalui perantara email atau website palsu dengan tujuan untuk mendapatkan data pribadi calon korban, hal ini berdampak pada kerugian material atau immateril yang tidak hanya dirasakan oleh korban melainkan juga oleh lembaga yang terkait dengan tindak kejahatan <em>fraud phis</em><em>h</em><em>ing</em> transaksi elektronik tersebut. Indonesia pada dasarnya telah menjajaki untuk memiliki peraturan terkait dengan penyelesaian tindak kejahatan <em>fraud phis</em><em>h</em><em>ing</em> transaksi elektronik. Namun, ketentuan yang ada tersebut dirasa belum cukup untuk mengurangi jumlah kasus <em>fraud phishing</em> dalam transaksi elektronik. Berdasarkan permasalahan tersebut Penulis berpendapat bahwa masih perlu pengkajian kembali terhadap pengaturan hukum tindak kejahatan<em> fraud phis</em><em>h</em><em>ing </em>transaksi elektronik, serta pelaksanaan pengaturan hukum tindak kejahatan <em>fraud phis</em><em>h</em><em>ing</em> transaksi elektronik sebagai bagian dari upaya penegakan hukum berdasarkan teori efektivitas hukum. Penelitian ini menggunakan metode penelitian hukum yaitu penelitian hukum yuridis normatif yang dibantu dengan pendekatan data empiris. Hasil penelitian ini menunjukkan bahwa Indonesia telah memiliki 4 pengaturan hukum terkait <em>fraud phis</em><em>h</em><em>ing</em> transaksi elektronik yaitu Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik diubah dengan Undang-Undang Nomor 19 Tahun 2016, Peraturan Pemerintah Nomor Peraturan Pemerintah Nomor 82 Tahun 2012 tentang Penyelenggaraan Sistem dan Transaksi Elektronik, KUHP Indonesia dan Undang-Undang Nomor 7 Tahun 1992 tentang Perbankan diubah dengan Undang-Undang Nomor 10 Tahun 1998, serta dalam pelaksanaan pengaturan hukum tersebut masih dinilai belum efektif jika dikaji dengan menggunakan teori efektivitas hukum </p>
APA, Harvard, Vancouver, ISO, and other styles
6

Bullee, Jan-Willem, Lorena Montoya, Marianne Junger, and Pieter Hartel. "Spear phishing in organisations explained." Information & Computer Security 25, no. 5 (November 13, 2017): 593–613. http://dx.doi.org/10.1108/ics-03-2017-0009.

Full text
Abstract:
Purpose The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient. Design/methodology/approach Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails. Findings Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishing condition. Employees having a high power distance cultural background were more likely to provide their PII, compared to those with a low one. There was no effect of age on providing the PII requested when the recipient’s years of service within the organisation is taken into account. Practical implications This research shows that success is higher when the opening sentence of a phishing email is personalised. The resulting model explains victimisation by phishing emails well, and it would allow practitioners to focus awareness campaigns to maximise their effect. Originality/value The innovative aspect relates to explaining spear phishing using four socio-demographic variables.
APA, Harvard, Vancouver, ISO, and other styles
7

Nmachi, Wosah Peace, and Thomas Win. "Phishing Mitigation Techniques: A Literature Survey." International Journal of Network Security & Its Applications 13, no. 2 (March 31, 2021): 63–72. http://dx.doi.org/10.5121/ijnsa.2021.13205.

Full text
Abstract:
Email is a channel of communication which isconsideredto be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about email is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have beenlimited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with anexplorationintohow phishing detection can be improved.
APA, Harvard, Vancouver, ISO, and other styles
8

Burita, Ladislav, Ivo Klaban, and Tomas Racil. "Education and Training Against Threat of Phishing Emails." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 7–18. http://dx.doi.org/10.34190/iccws.17.1.28.

Full text
Abstract:
The research results published in this article are oriented toward two areas: phishing email analysis and education for defense against the threats of phishing emails. The first topic builds on previous research primarily by analyzing changes in captured phishing emails over an interval of 4 weeks, half a year after the previous experiment. In this section, a statistical survey of phishing emails from both experiments is carried out and emails are segmented into categories focused on business, charity, asset transfer, and fund offers. The results of both experiments are then compared and validated. Based on this comparison and validation, a conclusion is made on trends and development in the phishing email domain in the last half a year. The second focus of our research is analysis of the existing education and testing systems for phishing emails. Based on the results of the analysis, a suitable system for university education and training against phishing and other malicious email threats will be designed. There is also an analysis of existing systems for improving and testing users' ability to recognize and react to phishing emails. Based on our findings about these systems, our own system is proposed. An experiment is prepared on "self-service" testing of phishing email detection skills performed by students with their colleagues. Some activists were employed to assist with this experiment; they will operate and prepare the environment according to the processed scenario. All experiments must be completely safe and effective at the same time. The experiments will be evaluated and the experience used to develop the education and training system at the university.
APA, Harvard, Vancouver, ISO, and other styles
9

Rastenis, Justinas, Simona Ramanauskaitė, Ivan Suzdalev, Kornelija Tunaitytė, Justinas Janulevičius, and Antanas Čenys. "Multi-Language Spam/Phishing Classification by Email Body Text: Toward Automated Security Incident Investigation." Electronics 10, no. 6 (March 12, 2021): 668. http://dx.doi.org/10.3390/electronics10060668.

Full text
Abstract:
Spamming and phishing are two types of emailing that are annoying and unwanted, differing by the potential threat and impact to the user. Automated classification of these categories can increase the users’ awareness as well as to be used for incident investigation prioritization or automated fact gathering. However, currently there are no scientific papers focusing on email classification concerning these two categories of spam and phishing emails. Therefore this paper presents a solution, based on email message body text automated classification into spam and phishing emails. We apply the proposed solution for email classification, written in three languages: English, Russian, and Lithuanian. As most public email datasets almost exclusively collect English emails, we investigate the suitability of automated dataset translation to adapt it to email classification, written in other languages. Experiments on public dataset usage limitations for a specific organization are executed in this paper to evaluate the need of dataset updates for more accurate classification results.
APA, Harvard, Vancouver, ISO, and other styles
10

Welk, Allaire K., Kyung Wha Hong, Olga A. Zielinska, Rucha Tembe, Emerson Murphy-Hill, and Christopher B. Mayhorn. "Will the “Phisher-Men” Reel You In?" International Journal of Cyber Behavior, Psychology and Learning 5, no. 4 (October 2015): 1–17. http://dx.doi.org/10.4018/ijcbpl.2015100101.

Full text
Abstract:
Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to performance on a phishing task. Undergraduate students completed a questionnaire designed to assess impulsivity, trust, personality characteristics, and Internet/security habits. Participants performed an email task where they had to discriminate between legitimate emails and phishing attempts. Researchers assessed performance in terms of correctly identifying all email types (overall accuracy) as well as accuracy in identifying phishing emails (phishing accuracy). Results indicated that overall and phishing accuracy each possessed unique trust, personality, and impulsivity predictors, but shared one significant behavioral predictor. These results present distinct predictors of phishing susceptibility that should be incorporated in the development of anti-phishing technology and training.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Phising email"

1

Utakrit, Nattakant. "Security awareness by online banking users in Western Australian of phishing attacks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/503.

Full text
Abstract:
Phishing involves sending e-mails pretending to be from the legitimate financial institutions to recipients and asking for personal information such as username and password. It also redirects network traffic to malicious sites, deny network traffic to web services, and modify protection mechanisms in the targeted computer systems. Consequences of successful attacks can include identity and financial losses, and unauthorised information disclosure. The purpose of this study was to investigate the experiences of Western Australian bank users in using online banking. The study considered the relationship between the background of the Western Australian bank users and their experience in using online banking security. The research analysed phishing through case studies that highlighted some of the experiences of phishing attacks and how to deal with the problems. Emphasis was placed on knowledge of phishing and threats and how they were actually implemented, or may be used, in undermining the security of users’ online banking services. The preferences and perspectives of Western Australian bank users about the deployment of online banking security protection and about future online banking services, in order to safeguard themselves against phishing attacks, are presented. The aim was to assist such Australian bank users through exploring potential solutions and making recommendations arising from this study. Research respondents had positive attitudes towards using online banking. Overall, they were satisfied with the security protection offered by their banks. However, although they believed that they had adequate knowledge of phishing and other online banking threats, their awareness of phishing attacks was not sufficient to protect themselves. Essentially, the respondents who had experienced a phishing attack believed it was due to weak security offered by their banks, rather than understanding that they needed more knowledge about security protection of their personal computers. Further education is required if users are to become fully aware of the need for security within their personal online banking.
APA, Harvard, Vancouver, ISO, and other styles
2

Rozentals, Emils. "Email load and stress impact on susceptibility to phishing and scam emails." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85403.

Full text
Abstract:
How does the email load and stress affect the susceptibility to phishing and scam emails? The study was conducted with a Qualitative research approach. Semi-structured interviews were selected for the data gathering. Thematic Analysis was used to analyze Empirical data. This research studied if a high email load affects the likelihood of falling victim to phishing and scam attacks. Research was studied through a theoretical lens of stress, since high email load is subjective for each individual and stress rate can show better how people are perceiving their email load. Findings suggest that high email load for the majority of people in this study, does increase the susceptibility towards phishing and scam emails. Furthermore, those people with higher email load who are processing their emails heuristically evaluated their stress rates higher than those with high email load who are processing their emails systematically. Therefore, the results indicate that there is a relation between high email load, stress and susceptibility to phishing and scam emails. In this study, it was found that majority of respondents described high stress as a factor that played a role in their susceptibility of falling victim to phishing and scam emails.
APA, Harvard, Vancouver, ISO, and other styles
3

Mustonen, B. (Benjamin). "Phishing in email and instant messaging." Bachelor's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201905181856.

Full text
Abstract:
Abstract. Phishing is a constantly evolving threat in the world of information security that affects everyone, no matter if you’re a retail worker or the head of IT in a large organisation. Because of this, this thesis aims to give the reader a good overview of what phishing is, and due to its prevalence in email and instant messaging, focuses on educating the reader on common signs and techniques used in phishing in the aforementioned forms of communication. The chosen research method is literature review, as it is the ideal choice for presenting an overview of a larger subject. As a result of the research, many common phishing signs and techniques in both email and instant messaging are presented. Some of these signs include strange senders, fake domain names and spellings mistakes. With this thesis, anyone looking to improve their understanding about phishing can do so in a way that is easy to understand. Some suggestions for future research are also presented based on this thesis’ shortcomings, namely the lack of studies on phishing in instant messaging.
APA, Harvard, Vancouver, ISO, and other styles
4

Slack, Andrew A. "Digital authentication for offical bulk email." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FSlack.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Garfinkel, Simson L. "March 2009." Description based on title screen as viewed on April 24, 2009. Author(s) subject terms: Digital Authentication, S/MIME, Official bulk email, phishing. Includes bibliographical references (p. 55-57). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Mei, Yuanxun. "Anti-phishing system : Detecting phishing e-mail." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2089.

Full text
Abstract:

Because of the development of the Internet and the rapid increase of the electronic commercial, the incidents on stealing the consumers' personal identify data and financial account credentials are becoming more and more common. This phenomenon is called phishing. Now phishing is so popular that web sites such as papal , eBay, MSN, Best Buy, and America Online are frequently spoofed by phishers. What’s more, the amount of the phishing sites is increasing at a high rate.

The aim of the report is to analyze different phishing phenomenon and help the readers to identify phishing attempts. Another goal is to design an anti-phishing system which can detect the phishing e-mails and then perform some operations to protect the users. Since this is a big project, I will focus on the mail detecting part that is to analyze the detected phishing emails and extract details from these mails.

A list of the most important information of this phishing mail is extracted, which contains “mail subject”, “ mail received date”, “targeted user”, “the links”, and “expiration and creation date of the domain”. The system can presently extract this information from 40% of analyzed e-mails.

APA, Harvard, Vancouver, ISO, and other styles
6

Vitek, Viktor, and Shah Taqui Syed. "Implementing a Nudge to Prevent Email Phishing." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259403.

Full text
Abstract:
Phishing is a reoccurring issue, which uses social engineering as an attack strategy. The prevention of these attacks is often content-based filters. These solutions are however not always perfect, and phishing emails can still be able to get through the filters. We suggest a new strategy to combat phishing. The strategy is a technical platform which uses the psychology concept nudge. Nudge is a concept that can be used to change a certain behaviour, in this case to make people more cautious when reading their emails.The objective of this thesis is to suggest a nudge using a technical platform regarding possible desensitization. The nudge aims to change email related behaviours to more healthy ones. To get indications if the nudge has benefits, a qualitative survey was made. When using a psychology-based solution, one must address the possibility of desensitization. To minimize possible desensitization, a quantitative analysis was made where different ways to minimize desensitization were assessed. Data for this analysis was gathered by a simulation modeling, where the simulation aimed to replicate a user performing email related events.The conclusion of the simulation results showed that a whitelist approach was the most appropriate for our nudge. The approach minimized the chance of possible desensitization while having a low risk of not performing a nudge when needed. The conclusion of the survey results was that there was an indication of behavioural change and that there existed a risk of possible desensitization.
Nätfiske är ett återkommande problem, som använder sig av social manipulation som attackstrategi. Försvar mot dessa attacker är ofta innehållsbaserade filter. Dessa lösningar är inte alltid perfekta, då nätfiske kan ibland gå förbi filterna. Vi föreslår en ny strategi för att bekämpa nätfiske. Strategin är en teknisk plattform som använder det psykologiska konceptet nudge. Nudge är ett koncept som kan användas för att ändra ett visst beteende, i detta fall för att göra människor mer försiktiga när de läser sina emails.Syftet med detta arbete är att föreslå en nudge i en teknisk plattform där man tar hänsyn till eventuell desensibilisering. Nudgens mål är att ändra emailrelaterade beteenden så att beteendena blir säkrare. En kvalitativ undersökning gjordes för att få indikationer om nudgen har möjliga fördelar. När man använder en psykologibaserad lösning så måste man ta itu med möjligheten av desensibilisering. En kvantitativ analys gjordes där olika sätt att minimera desensibilisering bedömdes, för att sedan kunna minimera desensibiliseringen. Data för denna analys samlades in genom en simuleringsmodellering, där simuleringens syfte var att replikera en användare som utför email-relaterade händelser.Slutsatsen av simuleringsresultaten visade att en whitelist-metod var den mest lämpliga för vår nudge. Metoden minimerade risken för möjlig desensibilisering, samtidigt som den hade en låg risk att inte utföra en nudge när det behövdes. Slutsatsen av undersökningsresultatet från enkäten var att det fanns en indikation för beteendeförändringar och att det fanns en risk för eventuell desensibilisering av nudgen.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghani, Hajra. "Phishing : En innehållsanalys av phishing på webben." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-29012.

Full text
Abstract:
The goal with this research has been to answer questions related to social engineeringbased phishing attacks: email phishing and website phishing. This study answers questions like why these attacks occur, which type of internet users easily get tricked by phishers, Moreover this study consist of different defense mechanisms that exist against the attacks, weaknesses in them, examples to improve them and other technical solutions against them. Often the attacks consist of a combination of both email phishing and website phishing. A link can be sent to a user via email that leads to a phishing site where the user get tricked into submitting personal information.These attacks aims to steal personal information and money from users. There are anti-phishing tools in web browsers and mailsystems to protect the user. There are special phishingfilters and features that can protect users from phishing mails and detect them. Users who get attacked by phishers are those who lack knowledge about them. But since high educated people and security experts also fall for phishing beacuse phishers develop new techniques and strategies to attack users, more advanced techniques in web browsers and mail systems are needed. This study was done through a systematic litterture review where 10 articles where chosen. These articles where studied and summarised through a content analysis.
Målet med denna undersökning har varit att besvara frågor relaterat till social engineeringbaserade phishngattacker: email phishing och website phishing. Den här studien tar upp varför dessa attacker utförs, vilka användare som mest blir drabbade av de. Vidare handlar studien om olika skyddsmekanismer som existerar mot attackerna, vilka bristerna det finns i de, eventuella förbättringsförslag och förslag på andra tekniska lösningar. Oftast sker attackerna genom en kombination av email phishing och website phishing. En skadlig länk kan skickas till en användare via mail som leder till en phishingsida där användaren blir lurad till att fylla i privata uppgifter om sig själv. Dessa attacker sker främst för att stjäla personuppgifter och leder oftast till att en användare blir drabbad finansiellt. Det finns olika anti-phishing verktyg i webbläsare och mailsystem för att skydda användare. Mot email phishing finns speciella phishingfilter och olika kännetecken som hjälper till att skydda mot skadliga mail och upptäcka de. De flesta som blir drabbade av phishing är just användare som ej är medvetna om vad phishing är. Men eftersom det visat sig att även högutbildade människor och säkerhetsexperter faller för phishing då phisher utvecklar nya tekniker och strategier att utföra attacker, krävs det mer avancerade tekniska lösningar i webbläsare och mailsystem. Studien har genomförts med hjälp av en systematisk litteraturstudie, där 10 artiklar valdes ut. Dessa artiklar bearbetades och sammanfattades genom en innehållsanalys.
APA, Harvard, Vancouver, ISO, and other styles
8

Lingaas, Türk Jakob. "Comparing the relative efficacy of phishing emails." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.

Full text
Abstract:
This study aimed to examine if there was a difference in how likely a victim is to click on a phishing email’s links based on the content of the email, the tone and language used and the structure of the code. This likelihood also includes the email’s ability to bypass spam filters.  Method: The method used to examine this was a simulated phishing attack. Six different phishing templates were created and sent out via the Gophish framework to target groups of students (from Halmstad University), from a randomized pool of 20.000 users. The phishing emails contained a link to a landing page (hosted via a virtual machine) which tracked user status. The templates were: Covid19 Pre-Attempt, Spotify Friendly CSS, Spotify Friendly Button, Spotify Aggressive CSS, Spotify Aggressive Button, Student Union. Results: Covid19 Pre-Attempt: 72.6% initial spam filter evasion, 45.8% spam filter evasion, 4% emails opened and 100% links clicked. Spotify Friendly CSS: 50% initial spam filter evasion, 38% spam filter evasion, 26.3% emails opened and 0% links clicked. Spotify Friendly Button: 59% initial spam filter evasion, 28.8% spam filter evasion, 5.8% emails opened and 0 %links clicked. Spotify Aggressive CSS: 50% initial spam filter evasion, 38% spam filter evasion, 10.5% emails opened, and 100% links clicked. Spotify Aggressive Button: 16% initial spam filter evasion, 25% spam filter evasion, 0% emails opened and 0% emails clicked. Student Union: 40% initial spam filter evasion, 75% spam filter evasion, 33.3% emails opened and 100% links clicked. Conclusion: Differently structured emails have different capabilities for bypassing spam filters and for deceiving users. Language and tone appears to affect phishing email efficacy; the results suggest that an aggressive and authoritative tone heightens a phishing email’s ability to deceive users, but seems to not affect its ability to bypass spam filters to a similar degree. Authenticity appears to affect email efficacy; the results showed a difference in deception efficacy if an email was structured like that of a genuine sender. Appealing to emotions such as stress and fear appears to increase the phishing email’s efficacy in deceiving a user.
Syftet med denna studie var att undersöka om det fanns en skillnad i hur troligt det är att ett offer klickar på länkarna till ett phishing-e-postmeddelande, baserat på innehållet i e-postmeddelandet, tonen och språket som används och kodens struktur. Denna sannolikhet inkluderar även e-postens förmåga att kringgå skräppostfilter. Metod: Metoden som användes var en simulerad phishing-attack. Sex olika phishing-mallar skapades och skickades ut via Gophish-ramverket till målgruppen bestående av studenter (från Halmstads universitet), från en slumpmässig pool med 20 000 användare. Phishing-e-postmeddelandena innehöll en länk till en målsida (hostad via en virtuell maskin) som spårade användarstatus. Mallarna var: Covid19 Pre-Attempt, Spotify Friendly CSS, Spotify Friendly Button, Spotify Aggressive CSS, Spotify Aggressive Button, Student Union. Resultat: Covid19 förförsök: 72,6% kringgick det primära spamfiltret, 45,8% kringgick det sekundära spamfiltret, 4% e-postmeddelanden öppnade och 100% länkar klickade Spotify Friendly CSS: 50% kringgick det primära spamfiltret, 38% kringgick det sekundära spamfiltret, 26,3% e-postmeddelanden öppnade och 0% länkar klickade. Spotify Friendly Button: 59% kringgick det primära spamfiltret, 28,8% kringgick det sekundära spamfiltret, 5.8% e-postmeddelanden öppnade och 0% länkar klickade. Spotify Aggressive CSS: 50% kringgick det primära spamfiltret, 38% kringgick det sekundära spamfiltret, 10,5% e-post öppnade och 100% länkar klickade. Spotify Aggressive Button: 16% kringgick det primära spamfiltret, 25% kringgick det sekundära spamfiltret, 0% e-postmeddelanden öppnade och 0% e-postmeddelanden klickade. Studentkåren: 40% kringgick det primära spamfiltret, 75% kringgick det sekundära spamfiltret, 33,3% e-postmeddelanden öppnade och 100% länkar klickade. Slutsats: Olika strukturerade e-postmeddelanden har olika funktioner för att kringgå skräppostfilter och för att lura användare. Språk och ton tycks påverka effektiviteten för epost-phishing. Resultaten tyder på att en aggressiv och auktoritär ton ökar phishing-epostmeddelandets förmåga att lura användare, men verkar inte påverka dess förmåga att kringgå skräppostfilter i motsvarande grad. Autenticitet verkar påverka e-postens effektivitet, då resultaten visade en skillnad i effektivitet om ett e-postmeddelande var strukturerat som en äkta avsändare. Att adressera känslor som stress och rädsla verkar öka phishing-e-postens effektivitet när det gäller att lura en användare.
APA, Harvard, Vancouver, ISO, and other styles
9

Trevino, Alberto. "Improving Filtering of Email Phishing Attacks by Using Three-Way Text Classifiers." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3103.

Full text
Abstract:
The Internet has been plagued with endless spam for over 15 years. However, in the last five years spam has morphed from an annoying advertising tool to a social engineering attack vector. Much of today's unwanted email tries to deceive users into replying with passwords, bank account information, or to visit malicious sites which steal login credentials and spread malware. These email-based attacks are known as phishing attacks. Much has been published about these attacks which try to appear real not only to users and subsequently, spam filters. Several sources indicate traditional content filters have a hard time detecting phishing attacks because the emails lack the traditional features and characteristics of spam messages. This thesis tests the hypothesis that by separating the messages into three categories (ham, spam and phish) content filters will yield better filtering performance. Even though experimentation showed three-way classification did not improve performance, several additional premises were tested, including the validity of the claim that phishing emails are too much like legitimate emails and the ability of Naive Bayes classifiers to properly classify emails.
APA, Harvard, Vancouver, ISO, and other styles
10

Alseadoon, Ibrahim Mohammed A. "The impact of users' characteristics on their ability to detect phishing emails." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/72873/1/Ibrahim%20Mohammed%20A_Alseadoon_Thesis.pdf.

Full text
Abstract:
We investigate how email users' characteristics influence their response to phishing emails. A user generally goes through three stages of behaviour upon receiving a phishing email: suspicion of the legitimacy of the email, confirmation of its legitimacy and response by either performing the action requested in the phishing email or not. Using a mixed method approach combining experiments, surveys and semi-structured interviews, we found that a user's behaviour at each stage varies with their personal characteristics such as personality traits and ability to perceive information in an email beyond its content. We found, for example, that users who are submissive, extraverted or open tend to be less suspicious of phishing emails while users who can identify cues such as inconsistent IP address, can avoid falling victim to phishing emails. Our findings enable us to draw practical implications for educating and potentially reducing the incidence of phishing emails victimisation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Phising email"

1

Fincher, Michele. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Indianapolis, IN, USA: Jon Wiley & Sons, Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Phishing Exposed. Syngress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

James, Lance, and Dave Jevans. Phishing Exposed. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hadnagy, Christopher, Robin Dreeke, and Michele Fincher. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hadnagy, Christopher, Robin Dreeke, and Michele Fincher. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Wiley & Sons, Limited, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hadnagy, Christopher, Robin Dreeke, and Michele Fincher. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vishwanath, Arun. The Weakest Link. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14653.001.0001.

Full text
Abstract:
An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizational cyber resilience. Phishing is the single biggest threat to cybersecurity, persuading even experienced users to click on hyperlinks and attachments in emails that conceal malware. Phishing has been responsible for every major cyber breach, from the infamous Sony hack in 2014 to the 2017 hack of the Democratic National Committee and the more recent Colonial Pipleline breach. The cybersecurity community's response has been intensive user training (often followed by user blaming), which has proven completely ineffective: the hacks keep coming. In The Weakest Link, cybersecurity expert Arun Vishwanath offers a new, evidence-based approach for detecting and defending against phishing—an approach that doesn't rely on continual training and retraining but provides a way to diagnose user vulnerability. Vishwanath explains how organizations can build a culture of cyber safety. He presents a Cyber Risk Survey (CRS) to help managers understand which users are at risk and why. Underlying CRS is the Suspicion, Cognition, Automaticity Model (SCAM), which specifies the user thoughts and actions that lead to either deception by or detection of phishing come-ons. He describes in detail how to implement these frameworks, discussing relevant insights from cognitive and behavioral science, and then presents case studies of organizations that have successfully deployed the CRS to achieve cyber resilience. These range from a growing wealth management company with twenty regional offices to a small Pennsylvania nonprofit with forty-five employees. The Weakest Link will revolutionize the way managers approach cyber security, replacing the current one-size-fits-all methodology with a strategy that targets specific user vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
8

Woodsmall, Dee. Fraud Examination : Examples of Phishing Emails and Scam Calls: Avoid Being Scammed. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Charles. Scams: Learn Valuable Skills to Avoid Being Scammed by Frauds. Real Experiences of Fraud Detection, Fraud Examination, Phishing Emails, Scam Calls and More. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bradley, Tony. Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security. Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Phising email"

1

Mossano, Mattia, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, and Melanie Volkamer. "SMILE - Smart eMaIl Link Domain Extractor." In Computer Security. ESORICS 2021 International Workshops, 403–12. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_23.

Full text
Abstract:
AbstractPhishing over email continues to be a significant threat, as such messages still end up in users’ inboxes. Several studies showed that users rarely check the URL in the statusbar before clicking a link and that they have difficulties reading URLs. To support users, we propose SMILE (Smart eMaIl Link domain Extractor), a novel approach that provides the relevant information to distinguish between legitimate and phishing emails checking the links in them. Once applied, SMILE modifies all links in an email to contain the domain and top-level-domain of the URL behind them, e.g., “Click here” in an legitimate Amazon email is modified to “Click here [amazon.com]”.
APA, Harvard, Vancouver, ISO, and other styles
2

Parmar, Yogeshvar Singh, and Hamid Jahankhani. "Utilising Machine Learning Against Email Phishing to Detect Malicious Emails." In Advanced Sciences and Technologies for Security Applications, 73–102. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88040-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bayl-Smith, Piers, Daniel Sturman, and Mark Wiggins. "Cue Utilization, Phishing Feature and Phishing Email Detection." In Financial Cryptography and Data Security, 56–70. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54455-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmed Ali, Ghassan. "Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails." In Advances in Intelligent Systems and Computing, 849–56. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33582-3_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Volkamer, Melanie, Karen Renaud, and Benjamin Reinheimer. "TORPEDO: TOoltip-poweRed Phishing Email DetectiOn." In ICT Systems Security and Privacy Protection, 161–75. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

A. Hamid, Isredza Rahmi, and Jemal Abawajy. "Hybrid Feature Selection for Phishing Email Detection." In Algorithms and Architectures for Parallel Processing, 266–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24669-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maleki, Nasim, and Ali A. Ghorbani. "Generating Phishing Emails Using Graph Database." In Information Security Practice and Experience, 434–49. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34339-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Remmide, Mohamed Abdelkarim, Fatima Boumahdi, and Narhimene Boustia. "Phishing Email Detection Using Bi-GRU-CNN Model." In Lecture Notes in Networks and Systems, 71–77. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95918-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Verma, Rakesh, Narasimha Shashidhar, and Nabil Hossain. "Detecting Phishing Emails the Natural Language Way." In Computer Security – ESORICS 2012, 824–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33167-1_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zareapoor, Masoumeh, Pourya Shamsolmoali, and M. Afshar Alam. "Highly Discriminative Features for Phishing Email Classification by SVD." In Advances in Intelligent Systems and Computing, 649–56. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2250-7_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Phising email"

1

Nmachi, Wosah Peace, and Thomas Win. "Mitigating Phishing Attack in Organisations: A Literature Review." In 8th International Conference on Artificial Intelligence and Applications (AIAP 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110105.

Full text
Abstract:
Email is a channel of communication which is increasingly used by individuals and organisations for exchange of information. It is considered to be a confidential medium of communication but this is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an exploration into how phishing detection can be improved.
APA, Harvard, Vancouver, ISO, and other styles
2

Ximenes, Pablo, and André dos Santos. "Exploiting the Trust Hierarchy among Email Systems." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2008. http://dx.doi.org/10.5753/sbseg.2008.20887.

Full text
Abstract:
This paper presents a critique of the current status of the trust hierarchy found among SMTP based email systems. We evaluate current trends and present real evidence that the prevalence of ad-hoc initiatives for trust classification is a potential risk in itself. In that sense, we describe a vulnerability found in Google’s free email service (Gmail) that allows an attacker to exploit the current trust hierarchy that exists between email providers in order to assemble powerful spam/phishing attacks. We demonstrate this vulnerability by crafting a proof of concept attack software that is able to send whitelisted open relayed unlimited spam and phishing messages through Google’s email servers, thus giving concrete evidence of the presented threat.
APA, Harvard, Vancouver, ISO, and other styles
3

Helmi, Rabab Alayham Abbas, Chua Shang Ren, Arshad Jamal, and Muhammad Irsyad Abdullah. "Email Anti-Phishing Detection Application." In 2019 IEEE 9th International Conference on System Engineering and Technology (ICSET). IEEE, 2019. http://dx.doi.org/10.1109/icsengt.2019.8906316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hamid, Isredza Rahmi A., and Jemal Abawajy. "Phishing Email Feature Selection Approach." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gutierrez, Luis Felipe, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, and Keith S. Jones. "Email Embeddings for Phishing Detection." In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 2020. http://dx.doi.org/10.1109/bigdata50022.2020.9377821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Crain, Jordan, Lukasz Opyrchal, and Atul Prakash. "Fighting Phishing with Trusted Email." In Fifth International Conference on Availability, Reliability, and Security (ARES 2010). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Al-hamar, Yousef, and Hoshang Kolivand. "A New Email Phishing Training Website." In 2020 13th International Conference on Developments in eSystems Engineering (DeSE). IEEE, 2020. http://dx.doi.org/10.1109/dese51703.2020.9450238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moore, Tyler, and Richard Clayton. "Discovering phishing dropboxes using email metadata." In 2012 eCrime Researchers Summit (eCrime 2012). IEEE, 2012. http://dx.doi.org/10.1109/ecrime.2012.6489515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Che, Hongming, Qinyun Liu, Lin Zou, Hongji Yang, Dongdai Zhou, and Feng Yu. "A Content-Based Phishing Email Detection Method." In 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2017. http://dx.doi.org/10.1109/qrs-c.2017.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Egozi, Gal, and Rakesh Verma. "Phishing Email Detection Using Robust NLP Techniques." In 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, 2018. http://dx.doi.org/10.1109/icdmw.2018.00009.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Phising email"

1

Fette, Ian, Norman Sadeh, and Anthony Tomasic. Learning to Detect Phishing Emails. Fort Belvoir, VA: Defense Technical Information Center, June 2006. http://dx.doi.org/10.21236/ada456046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wendt, Jeremy Daniel. Omen: identifying potential spear-phishing targets before the email is sent. Office of Scientific and Technical Information (OSTI), July 2013. http://dx.doi.org/10.2172/1093687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography