• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4630704)   Today's Articles (4)   Subscriber (49820)
For: Alabdan R. Phishing Attacks Survey: Types, Vectors, and Technical Approaches. Future Internet 2020;12:168. [DOI: 10.3390/fi12100168] [Citation(s) in RCA: 37] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
Number Cited by Other Article(s)
1
Irshad RR, Sohail SS, Hussain S, Madsen DØ, Zamani AS, Ahmed AAA, Alattab AA, Badr MM, Alwayle IM. Towards enhancing security of IoT-Enabled healthcare system. Heliyon 2023;9:e22336. [PMID: 38034697 PMCID: PMC10687057 DOI: 10.1016/j.heliyon.2023.e22336] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/31/2023] [Revised: 10/29/2023] [Accepted: 11/09/2023] [Indexed: 12/02/2023]  Open
2
Shaukat MW, Amin R, Muslam MMA, Alshehri AH, Xie J. A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning. SENSORS (BASEL, SWITZERLAND) 2023;23:8070. [PMID: 37836902 PMCID: PMC10575062 DOI: 10.3390/s23198070] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/22/2023] [Revised: 09/09/2023] [Accepted: 09/18/2023] [Indexed: 10/15/2023]
3
Yadav A, Kumar A, Singh V. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. Artif Intell Rev 2023;56:1-32. [PMID: 37362900 PMCID: PMC10014398 DOI: 10.1007/s10462-023-10454-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/17/2023]
4
A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems. FUTURE INTERNET 2022. [DOI: 10.3390/fi14080241] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
5
CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning. FUTURE INTERNET 2022. [DOI: 10.3390/fi14080229] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]  Open
6
Evaluation of Contextual and Game-Based Training for Phishing Detection. FUTURE INTERNET 2022. [DOI: 10.3390/fi14040104] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]  Open
7
Carroll F, Adejobi JA, Montasari R. How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society. SN COMPUTER SCIENCE 2022;3:170. [PMID: 35224514 PMCID: PMC8864450 DOI: 10.1007/s42979-022-01069-1] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/16/2021] [Accepted: 12/06/2021] [Indexed: 12/05/2022]
8
Giansanti D, Gulino RA. The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives. Healthcare (Basel) 2021;9:healthcare9121653. [PMID: 34946379 PMCID: PMC8702125 DOI: 10.3390/healthcare9121653] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/05/2021] [Revised: 11/23/2021] [Accepted: 11/24/2021] [Indexed: 11/16/2022]  Open
9
Intrusion Detection in Critical Infrastructures: A Literature Review. SMART CITIES 2021. [DOI: 10.3390/smartcities4030061] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
10
Yaacoub JPA, Noura HN, Salman O, Chehab A. Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2021;21:115-158. [PMID: 33776611 PMCID: PMC7978470 DOI: 10.1007/s10207-021-00545-8] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/14/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA