Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Artificial Neural Network for Websites Classification with Phishing Characteristics
(Articles)
Ricardo Pinto Ferreira
,
Andréa Martiniano
,
Domingos Napolitano
,
Marcio Romero
,
Dacyr Dante De Oliveira Gatto
,
Edquel Bueno Prado Farias
,
Renato José Sassi
Social Networking
Vol.7 No.2
, April 27, 2018
DOI:
10.4236/sn.2018.72008
1,760
Downloads
4,950
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
, February 13, 2018
DOI:
10.4236/jcc.2018.62003
2,250
Downloads
6,929
Views
Citations
HumanBoost: Utilization of Users’ Past Trust Decision for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
Journal of Intelligent Learning Systems and Applications
Vol.2 No.4
, December 14, 2010
DOI:
10.4236/jilsa.2010.24022
5,442
Downloads
10,400
Views
Citations
Mobile Phishing Attacks and Mitigation Techniques
(Articles)
Hossain Shahriar
,
Tulin Klintic
,
Victor Clincy
Journal of Information Security
Vol.6 No.3
, June 30, 2015
DOI:
10.4236/jis.2015.63021
9,760
Downloads
14,310
Views
Citations
Social Engineering Threat and Defense: A Literature Survey
(Articles)
Islam Abdalla Mohamed Abass
Journal of Information Security
Vol.9 No.4
, September 18, 2018
DOI:
10.4236/jis.2018.94018
5,045
Downloads
11,721
Views
Citations
MyCloudBills Pen Test and Network Security Assessment
(Articles)
Marcello D’Angelone
Open Access Library Journal
Vol.12 No.8
, August 28, 2025
DOI:
10.4236/oalib.1113973
57
Downloads
395
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
, October 10, 2024
DOI:
10.4236/jis.2024.154027
141
Downloads
926
Views
Citations
A Study of Social Engineering in Online Frauds
(Articles)
Brandon Atkins
,
Wilson Huang
Open Journal of Social Sciences
Vol.1 No.3
, August 30, 2013
DOI:
10.4236/jss.2013.13004
17,355
Downloads
32,566
Views
Citations
Systematic Review on Social Engineering: Hacking by Manipulating Humans
(Articles)
Chandra Sekhar Bhusal
Journal of Information Security
Vol.12 No.1
, January 19, 2021
DOI:
10.4236/jis.2021.121005
1,775
Downloads
8,808
Views
Citations
Operational Sustainability and Digital Leadership for Cybercrime Prevention
(Articles)
Bahaudin G. Mujtaba
International Journal of Internet and Distributed Systems
Vol.5 No.2
, October 13, 2023
DOI:
10.4236/ijids.2023.52002
410
Downloads
1,735
Views
Citations
Development of Two-Factor Authentication to Mitigate Phishing Attack
(Articles)
Varun Dixit
,
Davinderjit Kaur
Journal of Software Engineering and Applications
Vol.17 No.11
, November 6, 2024
DOI:
10.4236/jsea.2024.1711043
191
Downloads
1,181
Views
Citations
A Comparative Study of Ensemble Learning Techniques and Classification Models to Identify Phishing Websites
(Articles)
Alvina T. Budoen
,
Mingwu Zhang
,
Laban Zephaniah Edwards Jr.
Open Access Library Journal
Vol.12 No.6
, June 5, 2025
DOI:
10.4236/oalib.1113566
112
Downloads
868
Views
Citations
Preventing Phishing Attacks Using Advanced Deep Learning Techniques for Cyber Threat Mitigation
(Articles)
Mukund Sai Vikram Tyagadurgam
,
Venkataswamy Naidu Gangineni
,
Sriram Pabbineedi
,
Ajay Babu Kakani
,
Sri Krishna Kireeti Nandiraju
,
Sandeep Kumar Chundru
Journal of Data Analysis and Information Processing
Vol.13 No.3
, August 28, 2025
DOI:
10.4236/jdaip.2025.133020
88
Downloads
528
Views
Citations
Cyber Deception and Theft: A Critical Review
(Articles)
Paul Danquah
,
Stephen Bekoe
Journal of Information Security
Vol.17 No.2
, April 20, 2026
DOI:
10.4236/jis.2026.172008
9
Downloads
103
Views
Citations
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
(Articles)
Daisuke Miyamoto
,
Hiroaki Hazeyama
,
Youki Kadobayashi
,
Takeshi Takahashi
Journal of Intelligent Learning Systems and Applications
Vol.4 No.4
, November 28, 2012
DOI:
10.4236/jilsa.2012.44033
4,282
Downloads
7,072
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
, August 9, 2017
DOI:
10.4236/cn.2017.93012
2,519
Downloads
5,861
Views
Citations
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
(Articles)
Chevroen Washington
,
Phillip Yarbrough
,
Shavon Parker
,
Rafia Islam
,
Vishnu Vardhan Patamsetti
,
Olatunde Abiona
International Journal of Communications, Network and System Sciences
Vol.15 No.2
, February 17, 2022
DOI:
10.4236/ijcns.2022.152002
443
Downloads
2,469
Views
Citations
Preventing Phishing Attack on Voting System Using Visual Cryptography
(Articles)
Ahood Alotaibi
,
Lama Alhubaidi
,
Alghala Alyami
,
Leena Marghalani
,
Bashayer Alharbi
,
Naya Nagy
Journal of Computer and Communications
Vol.10 No.10
, October 31, 2022
DOI:
10.4236/jcc.2022.1010010
534
Downloads
3,153
Views
Citations
Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era
(Articles)
Anastasios Papathanasiou
,
George Liontos
,
Athanasios Katsouras
,
Vasiliki Liagkou
,
Euripides Glavas
Journal of Information Security
Vol.16 No.1
, November 19, 2024
DOI:
10.4236/jis.2025.161001
759
Downloads
7,839
Views
Citations
Artificial Intelligence in Cybersecurity to Detect Phishing
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Therence Niyonsaba
Journal of Computer and Communications
Vol.12 No.12
, December 25, 2024
DOI:
10.4236/jcc.2024.1212007
220
Downloads
2,023
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top