2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2019
DOI: 10.23919/mipro.2019.8757074
|View full text |Cite
|
Sign up to set email alerts
|

Phishing in Depth – Modern Methods of Detection and Risk Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Bikov et al [ 30 ] discussed the most prevalent attack vectors, the countermeasures necessary to limit the effect on corporate settings, and what further should be created to combat contemporary, sophisticated email assaults. None of the available anti-spam technologies can guarantee absolute efficiency against spam, phishing, or other harmful communications.…”
Section: Related Literaturementioning
confidence: 99%
“…Bikov et al [ 30 ] discussed the most prevalent attack vectors, the countermeasures necessary to limit the effect on corporate settings, and what further should be created to combat contemporary, sophisticated email assaults. None of the available anti-spam technologies can guarantee absolute efficiency against spam, phishing, or other harmful communications.…”
Section: Related Literaturementioning
confidence: 99%
“…User-dependent detection involves communication methods to identify phishing, such as phishing tests to assess user awareness. On the other hand, the automated approach includes software-based distributions, block lists, heuristic analyses based on multiple criteria, threat intelligence for security incidents and event management systems, and the use of Machine Learning (ML) and Artificial Intelligence (AI) technologies [28]. Among the proposed systems, random forest-based classifiers are found to be the most effective for evaluating whether a given URL refers to a phishing site [26].…”
Section: Phishingmentioning
confidence: 99%
“…Some attackers create a sense of limited opportunity, such as offering exclusive travel deals [34]. Furthermore, impulsivity and a tendency for sensationseeking have been linked to making mistakes in detecting phishing emails, as individuals using heuristic thinking tend to overlook details [28]. In [35], it was proposed that people who are overconfident in their ability to identify phishing may make errors due to omitting important details.…”
Section: Phishingmentioning
confidence: 99%