Journal articles on the topic 'Phising email'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Phising email.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Putra Y, Vikran Fasyadhiyaksa. "Modus Operandi Tindak Pidana Phising Menurut UU ITE." Jurist-Diction 4, no. 6 (November 5, 2021): 2525. http://dx.doi.org/10.20473/jd.v4i6.31857.
Full textIrawan, Dedi. "MENCURI INFORMASI PENTING DENGAN MENGAMBIL ALIH AKUN FACEBOOK DENGAN METODE PHISING." JIKI (Jurnal llmu Komputer & lnformatika) 1, no. 1 (July 6, 2020): 43–46. http://dx.doi.org/10.24127/jiki.v1i1.671.
Full textAminudin, Aminudin, and Eko Budi Cahyono. "KORELASI TIME TO LIVE TERHADAP QUERY TIDAK NORMAL PADA DNS MENGGUNAKAN BINARY LOGISTIC REGRESSION." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 7, no. 2 (April 1, 2021): 143–50. http://dx.doi.org/10.33330/jurteksi.v7i2.924.
Full textSingh, Kuldeep, Palvi Aggarwal, Prashanth Rajivan, and Cleotilde Gonzalez. "What makes phishing emails hard for humans to detect?" Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (December 2020): 431–35. http://dx.doi.org/10.1177/1071181320641097.
Full textYustitiana, Rhesita. "Pelaksanaan Pengaturan Hukum Tindak Kejahatan “Fraud Phising” Transaksi Elektronik sebagai Bagian dari Upaya Penegakan Hukum di Indonesia Dikaitkan dengan Teori Efektivitas Hukum [Implementation of the Criminal Act of Fraud Phising of Electronic Transaction as Part of the Law Enforcement Effort in Indonesia in Regard to the Effectiveness of Law Theory]." Jurnal Hukum Visio Justisia 1, no. 1 (July 31, 2021): 98. http://dx.doi.org/10.19166/vj.v1i1.3802.
Full textBullee, Jan-Willem, Lorena Montoya, Marianne Junger, and Pieter Hartel. "Spear phishing in organisations explained." Information & Computer Security 25, no. 5 (November 13, 2017): 593–613. http://dx.doi.org/10.1108/ics-03-2017-0009.
Full textNmachi, Wosah Peace, and Thomas Win. "Phishing Mitigation Techniques: A Literature Survey." International Journal of Network Security & Its Applications 13, no. 2 (March 31, 2021): 63–72. http://dx.doi.org/10.5121/ijnsa.2021.13205.
Full textBurita, Ladislav, Ivo Klaban, and Tomas Racil. "Education and Training Against Threat of Phishing Emails." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 7–18. http://dx.doi.org/10.34190/iccws.17.1.28.
Full textRastenis, Justinas, Simona Ramanauskaitė, Ivan Suzdalev, Kornelija Tunaitytė, Justinas Janulevičius, and Antanas Čenys. "Multi-Language Spam/Phishing Classification by Email Body Text: Toward Automated Security Incident Investigation." Electronics 10, no. 6 (March 12, 2021): 668. http://dx.doi.org/10.3390/electronics10060668.
Full textWelk, Allaire K., Kyung Wha Hong, Olga A. Zielinska, Rucha Tembe, Emerson Murphy-Hill, and Christopher B. Mayhorn. "Will the “Phisher-Men” Reel You In?" International Journal of Cyber Behavior, Psychology and Learning 5, no. 4 (October 2015): 1–17. http://dx.doi.org/10.4018/ijcbpl.2015100101.
Full textVerma, Priyanka, Anjali Goyal, and Yogita Gigras. "Email phishing: text classification using natural language processing." Computer Science and Information Technologies 1, no. 1 (May 1, 2020): 1–12. http://dx.doi.org/10.11591/csit.v1i1.p1-12.
Full textCooper, Molly, Yair Levy, Ling Wang, and Laurie Dringus. "Subject matter experts’ feedback on a prototype development of an audio, visual, and haptic phishing email alert system." Online Journal of Applied Knowledge Management 8, no. 2 (December 29, 2020): 107–21. http://dx.doi.org/10.36965/ojakm.2020.8(2)107-121.
Full textTornblad, McKenna K., Miriam E. Armstrong, Keith S. Jones, and Akbar Siami Namin. "Unrealistic Promises and Urgent Wording Differently Affect Suspicion of Phishing and Legitimate Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (September 2021): 363–67. http://dx.doi.org/10.1177/1071181321651277.
Full textR, Gokul, and Felix M. Philip. "Phishing Detection." YMER Digital 21, no. 06 (June 15, 2022): 405–12. http://dx.doi.org/10.37896/ymer21.06/39.
Full textMhaske-Dhamdhere, Vidya, and Sandeep Vanjale. "A novel approach for phishing emails real time classifica-tion using k-means algorithm." International Journal of Engineering & Technology 7, no. 1.2 (December 28, 2017): 96. http://dx.doi.org/10.14419/ijet.v7i1.2.9018.
Full textKavitha, T., G. Vaishnavi, M. Ramyashree, and Charanjeet Kaur. "Phishing Email Detection Using Improved RCNN with Multilevel Vectors and Attention Mechanism." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1301–4. http://dx.doi.org/10.22214/ijraset.2022.46812.
Full textLawson, Patrick, Olga Zielinska, Carl Pearson, and Christopher B. Mayhorn. "Interaction of Personality and Persuasion Tactics in Email Phishing Attacks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1331–33. http://dx.doi.org/10.1177/1541931213601815.
Full textVishwanath, Arun, Brynne Harrison, and Yu Jie Ng. "Suspicion, Cognition, and Automaticity Model of Phishing Susceptibility." Communication Research 45, no. 8 (February 10, 2016): 1146–66. http://dx.doi.org/10.1177/0093650215627483.
Full textNaswir, Ahmad Fadhil, and Lailatul Qadri Zakaria. "THE EFFECTIVENESS OF URL FEATURES ON PHISHING EMAILS CLASSIFICATION USING MACHINE LEARNING APPROACH." Asia-Pacific Journal of Information Technology and Multimedia 11, no. 02 (December 2022): 49–58. http://dx.doi.org/10.17576/apjitm-2022-1102-04.
Full textAkinyelu, Andronicus A., and Aderemi O. Adewumi. "Classification of Phishing Email Using Random Forest Machine Learning Technique." Journal of Applied Mathematics 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/425731.
Full textAnandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.
Full textIswanto, Hery, Erni Seniwati, Yuli Astuti, and Dina Maulina. "Comparison of Algorithms on Machine Learning For Spam Email Classification." IJISTECH (International Journal of Information System and Technology) 5, no. 4 (December 30, 2021): 446. http://dx.doi.org/10.30645/ijistech.v5i4.164.
Full textPriestman, Ward, Tony Anstis, Isabel G. Sebire, Shankar Sridharan, and Neil J. Sebire. "Phishing in healthcare organisations: threats, mitigation and approaches." BMJ Health & Care Informatics 26, no. 1 (September 2019): e100031. http://dx.doi.org/10.1136/bmjhci-2019-100031.
Full textDixon, Matt, James Nicholson, Dawn Branley-Bell, Pam Briggs, and Lynne Coventry. "Holding Your Hand on the Danger Button." Proceedings of the ACM on Human-Computer Interaction 6, MHCI (September 19, 2022): 1–22. http://dx.doi.org/10.1145/3546730.
Full textKikerpill, Kristjan, and Andra Siibak. "Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails." Masaryk University Journal of Law and Technology 13, no. 1 (June 30, 2019): 45–66. http://dx.doi.org/10.5817/mujlt2019-1-3.
Full textRaj S, Jeevan, Raghav K Sejpal, Priya N, and Dr Mir Aadil. "SUSPICIOUS E-MAIL DETECTION USING VARIOUS TECHNIQUES." International Journal of Engineering Applied Sciences and Technology 6, no. 10 (February 1, 2022): 212–16. http://dx.doi.org/10.33564/ijeast.2022.v06i10.028.
Full textB, Manoj, and Fancy C. "Checksec Email Phishi Trasher Tool." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 363. http://dx.doi.org/10.14419/ijet.v7i4.6.28442.
Full textZielinska, Olga A., Allaire K. Welk, Christopher B. Mayhorn, and Emerson Murphy-Hill. "A Temporal Analysis of Persuasion Principles in Phishing Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 765–69. http://dx.doi.org/10.1177/1541931213601175.
Full textMorovati, Kamran. "Detection of Phishing Emails with Email Forensic Analysis and Machine Learning Techniques." International Journal of Cyber-Security and Digital Forensics 8, no. 2 (2019): 98–107. http://dx.doi.org/10.17781/p002568.
Full textGreitzer, Frank L., Wanru Li, Kathryn B. Laskey, James Lee, and Justin Purl. "Experimental Investigation of Technical and Human Factors Related to Phishing Susceptibility." ACM Transactions on Social Computing 4, no. 2 (June 26, 2021): 1–48. http://dx.doi.org/10.1145/3461672.
Full textDadvandipour, Samad, and Aadil Gani Ganie. "Analyzing and predicting spear-phishing using machine learning methods." Multidiszciplináris tudományok 10, no. 4 (2020): 262–73. http://dx.doi.org/10.35925/j.multi.2020.4.30.
Full textIslam, Muhammad Nazrul, Tarannum Zaki, Md Sami Uddin, and Md Mahedi Hasan. "Security Threats for Big Data." International Journal of Information Communication Technologies and Human Development 10, no. 4 (October 2018): 1–18. http://dx.doi.org/10.4018/ijicthd.2018100101.
Full textMohammed, Mazin Abed, Dheyaa Ahmed Ibrahim, and Akbal Omran Salman. "Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language." Journal of Intelligent Systems 30, no. 1 (January 1, 2021): 774–92. http://dx.doi.org/10.1515/jisys-2021-0045.
Full textRevathi, G., K. Nageswara Rao, and G. Sita Ratnam. "Email Spam Detection using Naïve Bayes Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 653–55. http://dx.doi.org/10.22214/ijraset.2022.46654.
Full textSingh, Kuldeep, Palvi Aggarwal, Prashanth Rajivan, and Cleotilde Gonzalez. "Training to Detect Phishing Emails: Effects of the Frequency of Experienced Phishing Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 453–57. http://dx.doi.org/10.1177/1071181319631355.
Full textWang, Jingguo, Yuan Li, and H. Raghav Rao. "Overconfidence in Phishing Email Detection." Journal of the Association for Information Systems 17, no. 11 (November 2016): 759–83. http://dx.doi.org/10.17705/1jais.00442.
Full textRizzoni, Fabio, Sabina Magalini, Alessandra Casaroli, Pasquale Mari, Matt Dixon, and Lynne Coventry. "Phishing simulation exercise in a large hospital: A case study." DIGITAL HEALTH 8 (January 2022): 205520762210817. http://dx.doi.org/10.1177/20552076221081716.
Full textLötter, André, and Lynn Futcher. "A framework to assist email users in the identification of phishing attacks." Information & Computer Security 23, no. 4 (October 12, 2015): 370–81. http://dx.doi.org/10.1108/ics-10-2014-0070.
Full textMolinaro, Kylie A., and Matthew L. Bolton. "Using the Lens Model and Cognitive Continuum Theory to Understand the Effects of Cognition on Phishing Victimization." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 173–77. http://dx.doi.org/10.1177/1071181319631044.
Full textSarno, Dawn M., Joanna E. Lewis, Corey J. Bohil, and Mark B. Neider. "Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults." Human Factors: The Journal of the Human Factors and Ergonomics Society 62, no. 5 (June 25, 2019): 704–17. http://dx.doi.org/10.1177/0018720819855570.
Full textHarrison, Brynne, Elena Svetieva, and Arun Vishwanath. "Individual processing of phishing emails." Online Information Review 40, no. 2 (April 11, 2016): 265–81. http://dx.doi.org/10.1108/oir-04-2015-0106.
Full textFatima, Rubia, Affan Yasin, Lin Liu, and Jianmin Wang. "How persuasive is a phishing email? A phishing game for phishing awareness." Journal of Computer Security 27, no. 6 (October 11, 2019): 581–612. http://dx.doi.org/10.3233/jcs-181253.
Full textBergholz, André, Jan De Beer, Sebastian Glahn, Marie-Francine Moens, Gerhard Paaß, and Siehyun Strobel. "New filtering approaches for phishing email." Journal of Computer Security 18, no. 1 (January 1, 2010): 7–35. http://dx.doi.org/10.3233/jcs-2010-0371.
Full textRohini, P., and K. Ramya. "Phishing Email Filtering Techniques A Survey." International Journal of Computer Trends and Technology 17, no. 1 (November 25, 2014): 18–21. http://dx.doi.org/10.14445/22312803/ijctt-v17p105.
Full textAdewumi, Oluyinka Aderemi, and Ayobami Andronicus Akinyelu. "A hybrid firefly and support vector machine classifier for phishing email detection." Kybernetes 45, no. 6 (June 6, 2016): 977–94. http://dx.doi.org/10.1108/k-07-2014-0129.
Full textBroadhurst, Roderic, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias, and Yuguang Ipsen. "Phishing and Cybercrime Risks in a University Student Community." International Journal of Cybersecurity Intelligence and Cybercrime 2, no. 1 (February 1, 2019): 4–23. http://dx.doi.org/10.52306/02010219rzex445.
Full textWeaver, Bradley W., Adam M. Braly, and David M. Lane. "Training Users to Identify Phishing Emails." Journal of Educational Computing Research 59, no. 6 (February 11, 2021): 1169–83. http://dx.doi.org/10.1177/0735633121992516.
Full textMishler, Scott, Cody Jeffcoat, and Jing Chen. "Effects of Anthropomorphic Phishing Detection Aids, Transparency Information, and Feedback on User Trust, Performance, and Aid Retention." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, no. 1 (November 2019): 183. http://dx.doi.org/10.1177/1071181319631351.
Full textBurita, Ladislav, Petr Matoulek, Kamil Halouzka, and Pavel Kozak. "Analysis of phishing emails." AIMS Electronics and Electrical Engineering 5, no. 1 (2021): 93–116. http://dx.doi.org/10.3934/electreng.2021006.
Full textAtlam, Hany F., and Olayonu Oluwatimilehin. "Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review." Electronics 12, no. 1 (December 22, 2022): 42. http://dx.doi.org/10.3390/electronics12010042.
Full text