Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,935
Downloads
4,991
Views
Citations
HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
Journal of Intelligent Learning Systems and Applications
Vol.2 No.4
,December 14, 2010
DOI:
10.4236/jilsa.2010.24022
5,080
Downloads
9,644
Views
Citations
Mobile Phishing Attacks and Mitigation Techniques
(Articles)
Hossain Shahriar
,
Tulin Klintic
,
Victor Clincy
Journal of Information Security
Vol.6 No.3
,June 30, 2015
DOI:
10.4236/jis.2015.63021
9,096
Downloads
14,217
Views
Citations
Social Engineering Threat and Defense: A Literature Survey
(Articles)
Islam Abdalla Mohamed Abass
Journal of Information Security
Vol.9 No.4
,September 18, 2018
DOI:
10.4236/jis.2018.94018
4,392
Downloads
11,014
Views
Citations
A Study of Social Engineering in Online Frauds
(Articles)
Brandon Atkins
,
Wilson Huang
Open Journal of Social Sciences
Vol.1 No.3
,August 30, 2013
DOI:
10.4236/jss.2013.13004
14,281
Downloads
29,703
Views
Citations
Systematic Review on Social Engineering: Hacking by Manipulating Humans
(Articles)
Chandra Sekhar Bhusal
Journal of Information Security
Vol.12 No.1
,January 19, 2021
DOI:
10.4236/jis.2021.121005
1,054
Downloads
5,765
Views
Citations
Operational Sustainability and Digital Leadership for Cybercrime Prevention
(Articles)
Bahaudin G. Mujtaba
International Journal of Internet and Distributed Systems
Vol.5 No.2
,October 13, 2023
DOI:
10.4236/ijids.2023.52002
37
Downloads
195
Views
Citations
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
,
Takeshi Takahashi
Journal of Intelligent Learning Systems and Applications
Vol.4 No.4
,November 28, 2012
DOI:
10.4236/jilsa.2012.44033
3,932
Downloads
6,512
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,802
Downloads
4,886
Views
Citations
Artificial Neural Network for Websites Classification with Phishing Characteristics
(Articles)
Ricardo Pinto Ferreira
,
Andréa Martiniano
,
Domingos Napolitano
,
Marcio Romero
,
Dacyr Dante De Oliveira Gatto
,
Edquel Bueno Prado Farias
,
Renato José Sassi
Social Networking
Vol.7 No.2
,April 27, 2018
DOI:
10.4236/sn.2018.72008
1,441
Downloads
4,044
Views
Citations
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
(Articles)
Chevroen Washington
,
Phillip Yarbrough
,
Shavon Parker
,
Rafia Islam
,
Vishnu Vardhan Patamsetti
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.15 No.2
,February 17, 2022
DOI:
10.4236/ijcns.2022.152002
260
Downloads
1,639
Views
Citations
Preventing Phishing Attack on Voting System Using Visual Cryptography
(Articles)
Ahood Alotaibi
,
Lama Alhubaidi
,
Alghala Alyami
,
Leena Marghalani
,
Bashayer Alharbi
,
Naya Nagy
Journal of Computer and Communications
Vol.10 No.10
,October 31, 2022
DOI:
10.4236/jcc.2022.1010010
138
Downloads
1,862
Views
Citations
A Multi-Classifier Based Prediction Model for Phishing Emails Detection Using Topic Modelling, Named Entity Recognition and Image Processing
(Articles)
C. Emilin Shyni
,
S. Sarju
,
S. Swamynathan
Circuits and Systems
Vol.7 No.9
,July 26, 2016
DOI:
10.4236/cs.2016.79217
1,563
Downloads
3,061
Views
Citations
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2023 Scientific Research Publishing Inc. All Rights Reserved.
Top