Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
, February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,214
Downloads
6,759
Views
Citations
HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
Journal of Intelligent Learning Systems and Applications
Vol.2 No.4
, December 14, 2010
DOI:
10.4236/jilsa.2010.24022
5,408
Downloads
10,318
Views
Citations
Mobile Phishing Attacks and Mitigation Techniques
(Articles)
Hossain Shahriar
,
Tulin Klintic
,
Victor Clincy
Journal of Information Security
Vol.6 No.3
, June 30, 2015
DOI:
10.4236/jis.2015.63021
9,733
Downloads
14,211
Views
Citations
Social Engineering Threat and Defense: A Literature Survey
(Articles)
Islam Abdalla Mohamed Abass
Journal of Information Security
Vol.9 No.4
, September 18, 2018
DOI:
10.4236/jis.2018.94018
5,003
Downloads
11,516
Views
Citations
MyCloudBills Pen Test and Network Security Assessment
(Articles)
Marcello D’Angelone
Open Access Library Journal
Vol.12 No.8
, August 28, 2025
DOI:
10.4236/oalib.1113973
31
Downloads
303
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
, October 10, 2024
DOI:
10.4236/jis.2024.154027
124
Downloads
829
Views
Citations
A Study of Social Engineering in Online Frauds
(Articles)
Brandon Atkins
,
Wilson Huang
Open Journal of Social Sciences
Vol.1 No.3
, August 30, 2013
DOI:
10.4236/jss.2013.13004
17,292
Downloads
32,341
Views
Citations
Systematic Review on Social Engineering: Hacking by Manipulating Humans
(Articles)
Chandra Sekhar Bhusal
Journal of Information Security
Vol.12 No.1
, January 19, 2021
DOI:
10.4236/jis.2021.121005
1,728
Downloads
8,584
Views
Citations
Operational Sustainability and Digital Leadership for Cybercrime Prevention
(Articles)
Bahaudin G. Mujtaba
International Journal of Internet and Distributed Systems
Vol.5 No.2
, October 13, 2023
DOI:
10.4236/ijids.2023.52002
395
Downloads
1,649
Views
Citations
Development of Two-Factor Authentication to Mitigate Phishing Attack
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.11
, November 6, 2024
DOI:
10.4236/jsea.2024.1711043
179
Downloads
1,097
Views
Citations
A Comparative Study of Ensemble Learning Techniques and Classification Models to Identify Phishing Websites
(Articles)
Alvina T. Budoen
,
Mingwu Zhang
,
Laban Zephaniah Edwards Jr.
Open Access Library Journal
Vol.12 No.6
, June 5, 2025
DOI:
10.4236/oalib.1113566
93
Downloads
698
Views
Citations
Preventing Phishing Attacks Using Advanced Deep Learning Techniques for Cyber Threat Mitigation
(Articles)
Mukund Sai Vikram Tyagadurgam
,
Venkataswamy Naidu Gangineni
,
Sriram Pabbineedi
,
Ajay Babu Kakani
,
Sri Krishna Kireeti Nandiraju
,
Sandeep Kumar Chundru
Journal of Data Analysis and Information Processing
Vol.13 No.3
, August 28, 2025
DOI:
10.4236/jdaip.2025.133020
69
Downloads
421
Views
Citations
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
,
Takeshi Takahashi
Journal of Intelligent Learning Systems and Applications
Vol.4 No.4
, November 28, 2012
DOI:
10.4236/jilsa.2012.44033
4,237
Downloads
6,978
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
, August 9, 2017
DOI:
10.4236/cn.2017.93012
2,492
Downloads
5,780
Views
Citations
Artificial Neural Network for Websites Classification with Phishing Characteristics
(Articles)
Ricardo Pinto Ferreira
,
Andréa Martiniano
,
Domingos Napolitano
,
Marcio Romero
,
Dacyr Dante De Oliveira Gatto
,
Edquel Bueno Prado Farias
,
Renato José Sassi
Social Networking
Vol.7 No.2
, April 27, 2018
DOI:
10.4236/sn.2018.72008
1,725
Downloads
4,810
Views
Citations
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
(Articles)
Chevroen Washington
,
Phillip Yarbrough
,
Shavon Parker
,
Rafia Islam
,
Vishnu Vardhan Patamsetti
,
Olatunde Abiona
International Journal of Communications, Network and System Sciences
Vol.15 No.2
, February 17, 2022
DOI:
10.4236/ijcns.2022.152002
423
Downloads
2,394
Views
Citations
Preventing Phishing Attack on Voting System Using Visual Cryptography
(Articles)
Ahood Alotaibi
,
Lama Alhubaidi
,
Alghala Alyami
,
Leena Marghalani
,
Bashayer Alharbi
,
Naya Nagy
Journal of Computer and Communications
Vol.10 No.10
, October 31, 2022
DOI:
10.4236/jcc.2022.1010010
384
Downloads
2,950
Views
Citations
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
(Articles)
Anastasios Papathanasiou
,
George Liontos
,
Athanasios Katsouras
,
Vasiliki Liagkou
,
Euripides Glavas
Journal of Information Security
Vol.16 No.1
, November 19, 2024
DOI:
10.4236/jis.2025.161001
696
Downloads
7,049
Views
Citations
Artificial Intelligence in Cybersecurity to Detect Phishing
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Therence Niyonsaba
Journal of Computer and Communications
Vol.12 No.12
, December 25, 2024
DOI:
10.4236/jcc.2024.1212007
204
Downloads
1,860
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
, March 20, 2025
DOI:
10.4236/jcc.2025.133002
82
Downloads
462
Views
Citations
First
<
1
2
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top