Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,126
Downloads
6,229
Views
Citations
HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
Journal of Intelligent Learning Systems and Applications
Vol.2 No.4
,December 14, 2010
DOI:
10.4236/jilsa.2010.24022
5,253
Downloads
9,974
Views
Citations
Mobile Phishing Attacks and Mitigation Techniques
(Articles)
Hossain Shahriar
,
Tulin Klintic
,
Victor Clincy
Journal of Information Security
Vol.6 No.3
,June 30, 2015
DOI:
10.4236/jis.2015.63021
9,559
Downloads
13,774
Views
Citations
Social Engineering Threat and Defense: A Literature Survey
(Articles)
Islam Abdalla Mohamed Abass
Journal of Information Security
Vol.9 No.4
,September 18, 2018
DOI:
10.4236/jis.2018.94018
4,822
Downloads
10,830
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
71
Downloads
473
Views
Citations
A Study of Social Engineering in Online Frauds
(Articles)
Brandon Atkins
,
Wilson Huang
Open Journal of Social Sciences
Vol.1 No.3
,August 30, 2013
DOI:
10.4236/jss.2013.13004
16,816
Downloads
31,337
Views
Citations
Systematic Review on Social Engineering: Hacking by Manipulating Humans
(Articles)
Chandra Sekhar Bhusal
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121005
1,489
Downloads
7,634
Views
Citations
Operational Sustainability and Digital Leadership for Cybercrime Prevention
(Articles)
Bahaudin G. Mujtaba
International Journal of Internet and Distributed Systems
Vol.5 No.2
,October 13, 2023
DOI:
10.4236/ijids.2023.52002
298
Downloads
1,310
Views
Citations
Development of Two-Factor Authentication to Mitigate Phishing Attack
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.11
,November 6, 2024
DOI:
10.4236/jsea.2024.1711043
124
Downloads
691
Views
Citations
A Comparative Study of Ensemble Learning Techniques and Classification Models to Identify Phishing Websites
(Articles)
Alvina T. Budoen
,
Mingwu Zhang
,
Laban Zephaniah Edwards Jr.
Open Access Library Journal
Vol.12 No.6
,June 5, 2025
DOI:
10.4236/oalib.1113566
36
Downloads
214
Views
Citations
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
,
Takeshi Takahashi
Journal of Intelligent Learning Systems and Applications
Vol.4 No.4
,November 28, 2012
DOI:
10.4236/jilsa.2012.44033
4,107
Downloads
6,711
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
2,384
Downloads
5,444
Views
Citations
Artificial Neural Network for Websites Classification with Phishing Characteristics
(Articles)
Ricardo Pinto Ferreira
,
Andréa Martiniano
,
Domingos Napolitano
,
Marcio Romero
,
Dacyr Dante De Oliveira Gatto
,
Edquel Bueno Prado Farias
,
Renato José Sassi
Social Networking
Vol.7 No.2
,April 27, 2018
DOI:
10.4236/sn.2018.72008
1,638
Downloads
4,457
Views
Citations
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
(Articles)
Chevroen Washington
,
Phillip Yarbrough
,
Shavon Parker
,
Rafia Islam
,
Vishnu Vardhan Patamsetti
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.15 No.2
,February 17, 2022
DOI:
10.4236/ijcns.2022.152002
369
Downloads
2,126
Views
Citations
Preventing Phishing Attack on Voting System Using Visual Cryptography
(Articles)
Ahood Alotaibi
,
Lama Alhubaidi
,
Alghala Alyami
,
Leena Marghalani
,
Bashayer Alharbi
,
Naya Nagy
Journal of Computer and Communications
Vol.10 No.10
,October 31, 2022
DOI:
10.4236/jcc.2022.1010010
241
Downloads
2,602
Views
Citations
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
(Articles)
Anastasios Papathanasiou
,
George Liontos
,
Athanasios Katsouras
,
Vasiliki Liagkou
,
Euripides Glavas
Journal of Information Security
Vol.16 No.1
,November 19, 2024
DOI:
10.4236/jis.2025.161001
406
Downloads
3,896
Views
Citations
Artificial Intelligence in Cybersecurity to Detect Phishing
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Therence Niyonsaba
Journal of Computer and Communications
Vol.12 No.12
,December 25, 2024
DOI:
10.4236/jcc.2024.1212007
134
Downloads
1,092
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
46
Downloads
235
Views
Citations
A Multi-Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing
(Articles)
C. Emilin Shyni
,
S. Sarju
,
S. Swamynathan
Circuits and Systems
Vol.7 No.9
,July 26, 2016
DOI:
10.4236/cs.2016.79217
1,704
Downloads
3,479
Views
Citations
On Threat Models for Information-Stealing Malware (ISM) Targeting Password Managers
(Articles)
Vedika Sunil Bang
,
Vijay Madisetti
Journal of Information Security
Vol.16 No.2
,April 17, 2025
DOI:
10.4236/jis.2025.162015
52
Downloads
448
Views
Citations
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top