Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Phishing). Showing records 1 – 30 of 124 total matches.

[1] [2] [3] [4] [5]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters

1. Miyamoto, Daisuke. A Machine Learning Approach for Detecting Fraudulent Websites : 機械学習を用いた偽サイトの検知に関する研究; キカイ ガクシュウ オ モチイタ ニセ サイト ノ ケンチ ニ カンスル ケンキュウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miyamoto, D. (n.d.). A Machine Learning Approach for Detecting Fraudulent Websites : 機械学習を用いた偽サイトの検知に関する研究; キカイ ガクシュウ オ モチイタ ニセ サイト ノ ケンチ ニ カンスル ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/5223

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miyamoto, Daisuke. “A Machine Learning Approach for Detecting Fraudulent Websites : 機械学習を用いた偽サイトの検知に関する研究; キカイ ガクシュウ オ モチイタ ニセ サイト ノ ケンチ ニ カンスル ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed July 03, 2020. http://hdl.handle.net/10061/5223.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miyamoto, Daisuke. “A Machine Learning Approach for Detecting Fraudulent Websites : 機械学習を用いた偽サイトの検知に関する研究; キカイ ガクシュウ オ モチイタ ニセ サイト ノ ケンチ ニ カンスル ケンキュウ.” Web. 03 Jul 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Miyamoto D. A Machine Learning Approach for Detecting Fraudulent Websites : 機械学習を用いた偽サイトの検知に関する研究; キカイ ガクシュウ オ モチイタ ニセ サイト ノ ケンチ ニ カンスル ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10061/5223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Miyamoto D. A Machine Learning Approach for Detecting Fraudulent Websites : 機械学習を用いた偽サイトの検知に関する研究; キカイ ガクシュウ オ モチイタ ニセ サイト ノ ケンチ ニ カンスル ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/5223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Deakin University

2. A Hamid, Isredza Rahmi. Phishing detection and traceback mechanism.

Degree: 2015, Deakin University

 Isredza Rahmi A Hamid’s thesis entitled Phishing Detection and Trackback Mechanism. The thesis investigates detection of phishing attacks through email, novel method to profile the attacker and tracking the attack back to the origin. Advisors/Committee Members: Abawajy, Jemal.

Subjects/Keywords: cybercrime; phishing; trackback mechanism; email-born phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

A Hamid, I. R. (2015). Phishing detection and traceback mechanism. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30079022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

A Hamid, Isredza Rahmi. “Phishing detection and traceback mechanism.” 2015. Thesis, Deakin University. Accessed July 03, 2020. http://hdl.handle.net/10536/DRO/DU:30079022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

A Hamid, Isredza Rahmi. “Phishing detection and traceback mechanism.” 2015. Web. 03 Jul 2020.

Vancouver:

A Hamid IR. Phishing detection and traceback mechanism. [Internet] [Thesis]. Deakin University; 2015. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10536/DRO/DU:30079022.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

A Hamid IR. Phishing detection and traceback mechanism. [Thesis]. Deakin University; 2015. Available from: http://hdl.handle.net/10536/DRO/DU:30079022

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Oklahoma

3. Nguyen, Christopher. Learning Not to Take the Bait: An Examination of Training Methods and Overlearning on Phishing Susceptibility.

Degree: PhD, 2018, University of Oklahoma

 As phishing attacks become increasingly common and sophisticated, anti-phishing training must extend beyond teaching individuals about cues and rules associated with phishing. Specifically, training methods… (more)

Subjects/Keywords: Phishing; Overlearning; Anti-phishing training; Cybersecurity training

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, C. (2018). Learning Not to Take the Bait: An Examination of Training Methods and Overlearning on Phishing Susceptibility. (Doctoral Dissertation). University of Oklahoma. Retrieved from http://hdl.handle.net/11244/299684

Chicago Manual of Style (16th Edition):

Nguyen, Christopher. “Learning Not to Take the Bait: An Examination of Training Methods and Overlearning on Phishing Susceptibility.” 2018. Doctoral Dissertation, University of Oklahoma. Accessed July 03, 2020. http://hdl.handle.net/11244/299684.

MLA Handbook (7th Edition):

Nguyen, Christopher. “Learning Not to Take the Bait: An Examination of Training Methods and Overlearning on Phishing Susceptibility.” 2018. Web. 03 Jul 2020.

Vancouver:

Nguyen C. Learning Not to Take the Bait: An Examination of Training Methods and Overlearning on Phishing Susceptibility. [Internet] [Doctoral dissertation]. University of Oklahoma; 2018. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/11244/299684.

Council of Science Editors:

Nguyen C. Learning Not to Take the Bait: An Examination of Training Methods and Overlearning on Phishing Susceptibility. [Doctoral Dissertation]. University of Oklahoma; 2018. Available from: http://hdl.handle.net/11244/299684


NSYSU

4. Chu, I-chun. Phishing Detection Based on URL and TF-IDF.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Peopel now use E-mail to communicate mutually is widespread. For example, schools convey information to students through e-mail, companies convey to the staff in charge… (more)

Subjects/Keywords: URL; Domain; Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chu, I. (2009). Phishing Detection Based on URL and TF-IDF. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Thesis, NSYSU. Accessed July 03, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Web. 03 Jul 2020.

Vancouver:

Chu I. Phishing Detection Based on URL and TF-IDF. [Internet] [Thesis]. NSYSU; 2009. [cited 2020 Jul 03]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chu I. Phishing Detection Based on URL and TF-IDF. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

5. Antoniou, D. (author). A systematic method to execute simulated phishing tests.

Degree: 2015, Delft University of Technology

This thesis is a coding scheme with which people can perform simulated phishing tests in systematic way. This enables the making of evidence-based phishing and allows for future analysis of the phishing results.

Management of Technology

ICT

Technology, Policy and Management

Advisors/Committee Members: Pieters, W. (mentor).

Subjects/Keywords: phishing; coding scheme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Antoniou, D. (. (2015). A systematic method to execute simulated phishing tests. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:a564c014-59d0-4802-860d-cae04d69448a

Chicago Manual of Style (16th Edition):

Antoniou, D (author). “A systematic method to execute simulated phishing tests.” 2015. Masters Thesis, Delft University of Technology. Accessed July 03, 2020. http://resolver.tudelft.nl/uuid:a564c014-59d0-4802-860d-cae04d69448a.

MLA Handbook (7th Edition):

Antoniou, D (author). “A systematic method to execute simulated phishing tests.” 2015. Web. 03 Jul 2020.

Vancouver:

Antoniou D(. A systematic method to execute simulated phishing tests. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2020 Jul 03]. Available from: http://resolver.tudelft.nl/uuid:a564c014-59d0-4802-860d-cae04d69448a.

Council of Science Editors:

Antoniou D(. A systematic method to execute simulated phishing tests. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:a564c014-59d0-4802-860d-cae04d69448a


Victoria University of Wellington

6. Nowitz, Jayden. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients.

Degree: 2018, Victoria University of Wellington

 Research on how to counter phishing from a user behavior perspective has been explored for over a decade, yet the prevalence of such threats is… (more)

Subjects/Keywords: Phishing; Mobile; Desktop

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nowitz, J. (2018). A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/7907

Chicago Manual of Style (16th Edition):

Nowitz, Jayden. “A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients.” 2018. Masters Thesis, Victoria University of Wellington. Accessed July 03, 2020. http://hdl.handle.net/10063/7907.

MLA Handbook (7th Edition):

Nowitz, Jayden. “A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients.” 2018. Web. 03 Jul 2020.

Vancouver:

Nowitz J. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. [Internet] [Masters thesis]. Victoria University of Wellington; 2018. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10063/7907.

Council of Science Editors:

Nowitz J. A Modern Perspective on Phishing: An investigation into susceptibility to phishing attacks between mobile and desktop email clients. [Masters Thesis]. Victoria University of Wellington; 2018. Available from: http://hdl.handle.net/10063/7907


University of Alberta

7. Teh-Chung, Chen. Detecting Visually Similar Web Pages: Application to Phishing Detection.

Degree: PhD, Department of Electrical and Computer Engineering, 2011, University of Alberta

 We propose a novel approach for detecting visual similarity between two web pages. The proposed approach applies Gestalt theory and considers a webpage as a… (more)

Subjects/Keywords: Computer security; Phishing; Webpage similarity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Teh-Chung, C. (2011). Detecting Visually Similar Web Pages: Application to Phishing Detection. (Doctoral Dissertation). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/f7623d88z

Chicago Manual of Style (16th Edition):

Teh-Chung, Chen. “Detecting Visually Similar Web Pages: Application to Phishing Detection.” 2011. Doctoral Dissertation, University of Alberta. Accessed July 03, 2020. https://era.library.ualberta.ca/files/f7623d88z.

MLA Handbook (7th Edition):

Teh-Chung, Chen. “Detecting Visually Similar Web Pages: Application to Phishing Detection.” 2011. Web. 03 Jul 2020.

Vancouver:

Teh-Chung C. Detecting Visually Similar Web Pages: Application to Phishing Detection. [Internet] [Doctoral dissertation]. University of Alberta; 2011. [cited 2020 Jul 03]. Available from: https://era.library.ualberta.ca/files/f7623d88z.

Council of Science Editors:

Teh-Chung C. Detecting Visually Similar Web Pages: Application to Phishing Detection. [Doctoral Dissertation]. University of Alberta; 2011. Available from: https://era.library.ualberta.ca/files/f7623d88z


Open Universiteit Nederland

8. Dreijer, Koen. Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector .

Degree: 2012, Open Universiteit Nederland

 De hoofdvraag van dit onderzoek luidt: Wat doen organisaties in de financiële sector om phishing te voorkomen, welke maatregelen blijken effectief om phishing tegen te… (more)

Subjects/Keywords: phishing; internetbankieren; IT security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dreijer, K. (2012). Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/4391

Chicago Manual of Style (16th Edition):

Dreijer, Koen. “Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector .” 2012. Masters Thesis, Open Universiteit Nederland. Accessed July 03, 2020. http://hdl.handle.net/1820/4391.

MLA Handbook (7th Edition):

Dreijer, Koen. “Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector .” 2012. Web. 03 Jul 2020.

Vancouver:

Dreijer K. Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector . [Internet] [Masters thesis]. Open Universiteit Nederland; 2012. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/1820/4391.

Council of Science Editors:

Dreijer K. Online hengelen zonder vergunning: een afstudeeronderzoek naar de mogelijkheden, effectiviteit en acceptatie van maatregelen tegen phishing gezien vanuit de financiële sector . [Masters Thesis]. Open Universiteit Nederland; 2012. Available from: http://hdl.handle.net/1820/4391


Royal Roads University

9. Laur, Brandon. Information security’s perception of phishing tactics .

Degree: 2018, Royal Roads University

 This research develops qualitative knowledge from the information security industry about communication tactics as a type of security vulnerability in infosec. These perspectives included security… (more)

Subjects/Keywords: Cybersecurity; Hacking; Infosec; Phishing; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laur, B. (2018). Information security’s perception of phishing tactics . (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Thesis, Royal Roads University. Accessed July 03, 2020. http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Laur, Brandon. “Information security’s perception of phishing tactics .” 2018. Web. 03 Jul 2020.

Vancouver:

Laur B. Information security’s perception of phishing tactics . [Internet] [Thesis]. Royal Roads University; 2018. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10613/6696.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Laur B. Information security’s perception of phishing tactics . [Thesis]. Royal Roads University; 2018. Available from: http://hdl.handle.net/10613/6696

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Ottawa

10. Le Page, Sophie. Understanding the Phishing Ecosystem .

Degree: 2019, University of Ottawa

 In “phishing attacks”, phishing websites mimic trustworthy websites in order to steal sensitive information from end-users. Despite research by both academia and the industry focusing… (more)

Subjects/Keywords: Phishing attacks; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Le Page, S. (2019). Understanding the Phishing Ecosystem . (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/39385

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Le Page, Sophie. “Understanding the Phishing Ecosystem .” 2019. Thesis, University of Ottawa. Accessed July 03, 2020. http://hdl.handle.net/10393/39385.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Le Page, Sophie. “Understanding the Phishing Ecosystem .” 2019. Web. 03 Jul 2020.

Vancouver:

Le Page S. Understanding the Phishing Ecosystem . [Internet] [Thesis]. University of Ottawa; 2019. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10393/39385.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Le Page S. Understanding the Phishing Ecosystem . [Thesis]. University of Ottawa; 2019. Available from: http://hdl.handle.net/10393/39385

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

11. Fahim Hashemi, Hana Sadat. A Hybrid Approach to Detect Tabnabbing Attacks .

Degree: Computing, 2014, Queens University

Phishing is one of the most prevalent types of modern attacks, costing significant financial losses to enterprises and users each day. Despite the emergence of… (more)

Subjects/Keywords: Tabnabbing; Attack Detection; Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fahim Hashemi, H. S. (2014). A Hybrid Approach to Detect Tabnabbing Attacks . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fahim Hashemi, Hana Sadat. “A Hybrid Approach to Detect Tabnabbing Attacks .” 2014. Thesis, Queens University. Accessed July 03, 2020. http://hdl.handle.net/1974/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fahim Hashemi, Hana Sadat. “A Hybrid Approach to Detect Tabnabbing Attacks .” 2014. Web. 03 Jul 2020.

Vancouver:

Fahim Hashemi HS. A Hybrid Approach to Detect Tabnabbing Attacks . [Internet] [Thesis]. Queens University; 2014. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/1974/12398.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fahim Hashemi HS. A Hybrid Approach to Detect Tabnabbing Attacks . [Thesis]. Queens University; 2014. Available from: http://hdl.handle.net/1974/12398

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Geitman, Brandon. Efficacy of Embedded Phishing Training.

Degree: 2018, Ferris State University

 Embedded phishing training is a training methodology where users are sent simulated phishing emails to test users’ vulnerability to phishing attacks. Research studies seeking to… (more)

Subjects/Keywords: Phishing; Information technology management.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Geitman, B. (2018). Efficacy of Embedded Phishing Training. (Thesis). Ferris State University. Retrieved from http://hdl.handle.net/2323/6373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Geitman, Brandon. “Efficacy of Embedded Phishing Training.” 2018. Thesis, Ferris State University. Accessed July 03, 2020. http://hdl.handle.net/2323/6373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Geitman, Brandon. “Efficacy of Embedded Phishing Training.” 2018. Web. 03 Jul 2020.

Vancouver:

Geitman B. Efficacy of Embedded Phishing Training. [Internet] [Thesis]. Ferris State University; 2018. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/2323/6373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Geitman B. Efficacy of Embedded Phishing Training. [Thesis]. Ferris State University; 2018. Available from: http://hdl.handle.net/2323/6373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

13. Meijdam, K.C. (author). Phishing as a Service: Designing an ethical way of mimicking targeted phishing attacks to train employees.

Degree: 2015, Delft University of Technology

Organisations want to protect themselves against targeted phishing attacks, and mimicking those in order to train their employees in an important measure to do so.… (more)

Subjects/Keywords: Value Sensitive Design; targeted phishing; security awareness; phishing training

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meijdam, K. C. (. (2015). Phishing as a Service: Designing an ethical way of mimicking targeted phishing attacks to train employees. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:3134a851-2b40-4af1-896a-41a6ce7a5816

Chicago Manual of Style (16th Edition):

Meijdam, K C (author). “Phishing as a Service: Designing an ethical way of mimicking targeted phishing attacks to train employees.” 2015. Masters Thesis, Delft University of Technology. Accessed July 03, 2020. http://resolver.tudelft.nl/uuid:3134a851-2b40-4af1-896a-41a6ce7a5816.

MLA Handbook (7th Edition):

Meijdam, K C (author). “Phishing as a Service: Designing an ethical way of mimicking targeted phishing attacks to train employees.” 2015. Web. 03 Jul 2020.

Vancouver:

Meijdam KC(. Phishing as a Service: Designing an ethical way of mimicking targeted phishing attacks to train employees. [Internet] [Masters thesis]. Delft University of Technology; 2015. [cited 2020 Jul 03]. Available from: http://resolver.tudelft.nl/uuid:3134a851-2b40-4af1-896a-41a6ce7a5816.

Council of Science Editors:

Meijdam KC(. Phishing as a Service: Designing an ethical way of mimicking targeted phishing attacks to train employees. [Masters Thesis]. Delft University of Technology; 2015. Available from: http://resolver.tudelft.nl/uuid:3134a851-2b40-4af1-896a-41a6ce7a5816


University of South Florida

14. Martin, Jaclyn. Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.

Degree: 2017, University of South Florida

 Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart,… (more)

Subjects/Keywords: cyberpsychology; spear-phishing; phishing; personality; SDT; decision-making; Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martin, J. (2017). Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/6728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Martin, Jaclyn. “Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.” 2017. Thesis, University of South Florida. Accessed July 03, 2020. https://scholarcommons.usf.edu/etd/6728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Martin, Jaclyn. “Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace.” 2017. Web. 03 Jul 2020.

Vancouver:

Martin J. Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace. [Internet] [Thesis]. University of South Florida; 2017. [cited 2020 Jul 03]. Available from: https://scholarcommons.usf.edu/etd/6728.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Martin J. Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace. [Thesis]. University of South Florida; 2017. Available from: https://scholarcommons.usf.edu/etd/6728

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Houston

15. Rai, Nirmala 1988-. A Multi-Pronged Approach to Phishing Email Detection.

Degree: MS, Computer Science, 2015, University of Houston

Phishing emails are a nuisance and a growing threat for the world causing loss of time, effort and money. In this era of online communication… (more)

Subjects/Keywords: Phishing; Email; Message-ID; Header-Domains

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rai, N. 1. (2015). A Multi-Pronged Approach to Phishing Email Detection. (Masters Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/5374

Chicago Manual of Style (16th Edition):

Rai, Nirmala 1988-. “A Multi-Pronged Approach to Phishing Email Detection.” 2015. Masters Thesis, University of Houston. Accessed July 03, 2020. http://hdl.handle.net/10657/5374.

MLA Handbook (7th Edition):

Rai, Nirmala 1988-. “A Multi-Pronged Approach to Phishing Email Detection.” 2015. Web. 03 Jul 2020.

Vancouver:

Rai N1. A Multi-Pronged Approach to Phishing Email Detection. [Internet] [Masters thesis]. University of Houston; 2015. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10657/5374.

Council of Science Editors:

Rai N1. A Multi-Pronged Approach to Phishing Email Detection. [Masters Thesis]. University of Houston; 2015. Available from: http://hdl.handle.net/10657/5374


Virginia Tech

16. Peng, Peng. A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives.

Degree: MS, Computer Science and Applications, 2020, Virginia Tech

Phishing attack is the fraudulent attempt to lure the target users to give away sensitive information such as usernames, passwords and credit card details. Cybercriminals… (more)

Subjects/Keywords: Phishing; Measurement; Credential Sharing; Online Scan Engines

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peng, P. (2020). A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/96401

Chicago Manual of Style (16th Edition):

Peng, Peng. “A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives.” 2020. Masters Thesis, Virginia Tech. Accessed July 03, 2020. http://hdl.handle.net/10919/96401.

MLA Handbook (7th Edition):

Peng, Peng. “A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives.” 2020. Web. 03 Jul 2020.

Vancouver:

Peng P. A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10919/96401.

Council of Science Editors:

Peng P. A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/96401


University of Edinburgh

17. Roy, Graeme Stuart. Usability engineering for code-based multi-factor authentication.

Degree: PhD, 2013, University of Edinburgh

 The increase in the use of online banking and other alternative banking channels has led to improved flexibility for customers but also an increase in… (more)

Subjects/Keywords: 364.16; usability engineering; phishing; malware; usable security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roy, G. S. (2013). Usability engineering for code-based multi-factor authentication. (Doctoral Dissertation). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/11799

Chicago Manual of Style (16th Edition):

Roy, Graeme Stuart. “Usability engineering for code-based multi-factor authentication.” 2013. Doctoral Dissertation, University of Edinburgh. Accessed July 03, 2020. http://hdl.handle.net/1842/11799.

MLA Handbook (7th Edition):

Roy, Graeme Stuart. “Usability engineering for code-based multi-factor authentication.” 2013. Web. 03 Jul 2020.

Vancouver:

Roy GS. Usability engineering for code-based multi-factor authentication. [Internet] [Doctoral dissertation]. University of Edinburgh; 2013. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/1842/11799.

Council of Science Editors:

Roy GS. Usability engineering for code-based multi-factor authentication. [Doctoral Dissertation]. University of Edinburgh; 2013. Available from: http://hdl.handle.net/1842/11799


University of Hong Kong

18. 梁仲文. An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms.

Degree: 2009, University of Hong Kong

Subjects/Keywords: Phishing.; International business enterprises.; Phishing - Prevention.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

梁仲文.. (2009). An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms. (Thesis). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/56533

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

梁仲文.. “An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms.” 2009. Thesis, University of Hong Kong. Accessed July 03, 2020. http://hdl.handle.net/10722/56533.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

梁仲文.. “An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms.” 2009. Web. 03 Jul 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

梁仲文.. An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms. [Internet] [Thesis]. University of Hong Kong; 2009. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/10722/56533.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

梁仲文.. An analysis of the impact of phishing and anti-phishing related announcements on market value of global firms. [Thesis]. University of Hong Kong; 2009. Available from: http://hdl.handle.net/10722/56533

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

19. Klaus Steding-Jessen. Uso de honeypots para o estudo de spam e phishing.

Degree: 2008, Instituto Nacional de Pesquisas Espaciais

Este trabalho propoe uma infra-estrutura extensível de sensores, baseada em honeypots, para estudar o problema do spam e do phishing, de modo a obter dados… (more)

Subjects/Keywords: honeypots; spam; proxies abertos; phishing; estudo; honeyspot; spam; open proxies; phishing; study

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Steding-Jessen, K. (2008). Uso de honeypots para o estudo de spam e phishing. (Thesis). Instituto Nacional de Pesquisas Espaciais. Retrieved from http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Steding-Jessen, Klaus. “Uso de honeypots para o estudo de spam e phishing.” 2008. Thesis, Instituto Nacional de Pesquisas Espaciais. Accessed July 03, 2020. http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Steding-Jessen, Klaus. “Uso de honeypots para o estudo de spam e phishing.” 2008. Web. 03 Jul 2020.

Vancouver:

Steding-Jessen K. Uso de honeypots para o estudo de spam e phishing. [Internet] [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2008. [cited 2020 Jul 03]. Available from: http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Steding-Jessen K. Uso de honeypots para o estudo de spam e phishing. [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2008. Available from: http://urlib.net/sid.inpe.br/[email protected]/2008/08.18.19.02

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

20. Alseadoon, Ibrahim Mohammed A. The impact of users' characteristics on their ability to detect phishing emails.

Degree: 2014, Queensland University of Technology

 We investigate how email users' characteristics influence their response to phishing emails. A user generally goes through three stages of behaviour upon receiving a phishing(more)

Subjects/Keywords: Phishing emails; Detection; Deception; Individual factors; emails; Phishing; users' behaviour; users' characteristics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alseadoon, I. M. A. (2014). The impact of users' characteristics on their ability to detect phishing emails. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/72873/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alseadoon, Ibrahim Mohammed A. “The impact of users' characteristics on their ability to detect phishing emails.” 2014. Thesis, Queensland University of Technology. Accessed July 03, 2020. https://eprints.qut.edu.au/72873/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alseadoon, Ibrahim Mohammed A. “The impact of users' characteristics on their ability to detect phishing emails.” 2014. Web. 03 Jul 2020.

Vancouver:

Alseadoon IMA. The impact of users' characteristics on their ability to detect phishing emails. [Internet] [Thesis]. Queensland University of Technology; 2014. [cited 2020 Jul 03]. Available from: https://eprints.qut.edu.au/72873/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alseadoon IMA. The impact of users' characteristics on their ability to detect phishing emails. [Thesis]. Queensland University of Technology; 2014. Available from: https://eprints.qut.edu.au/72873/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Floderus, Sebastian. An educational experiment in discovering spear phishing attacks.

Degree: 2019, , Department of Computer Science

  Background: Spear phishing attacks uses social engineering targeting a specific person to steal credential information or infect the users computer with malware. It is… (more)

Subjects/Keywords: Phishing; Spear-phishing; Experiment; Security awareness; Computer Sciences; Datavetenskap (datalogi); Learning; Lärande

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Floderus, S. (2019). An educational experiment in discovering spear phishing attacks. (Thesis). , Department of Computer Science. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Floderus, Sebastian. “An educational experiment in discovering spear phishing attacks.” 2019. Thesis, , Department of Computer Science. Accessed July 03, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Floderus, Sebastian. “An educational experiment in discovering spear phishing attacks.” 2019. Web. 03 Jul 2020.

Vancouver:

Floderus S. An educational experiment in discovering spear phishing attacks. [Internet] [Thesis]. , Department of Computer Science; 2019. [cited 2020 Jul 03]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Floderus S. An educational experiment in discovering spear phishing attacks. [Thesis]. , Department of Computer Science; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

22. Beňo, Marek. Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages.

Degree: 2019, Brno University of Technology

 This work deals with the design of a phishing attack detection and classification tool. The work describes techniques and forms of phishing attacks and availible… (more)

Subjects/Keywords: phishing; malvér; bezpečnosť; webové stránky; YARA; Python; phishing; malware; security; web pages; YARA; Python

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beňo, M. (2019). Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/180460

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Beňo, Marek. “Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages.” 2019. Thesis, Brno University of Technology. Accessed July 03, 2020. http://hdl.handle.net/11012/180460.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Beňo, Marek. “Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages.” 2019. Web. 03 Jul 2020.

Vancouver:

Beňo M. Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/11012/180460.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Beňo M. Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/180460

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

23. Beňo, Marek. Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages.

Degree: 2020, Brno University of Technology

 This work deals with the design of a phishing attack detection and classification tool. The work describes techniques and forms of phishing attacks and availible… (more)

Subjects/Keywords: phishing; malvér; bezpečnosť; webové stránky; YARA; Python; phishing; malware; security; web pages; YARA; Python

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beňo, M. (2020). Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/188934

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Beňo, Marek. “Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages.” 2020. Thesis, Brno University of Technology. Accessed July 03, 2020. http://hdl.handle.net/11012/188934.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Beňo, Marek. “Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages.” 2020. Web. 03 Jul 2020.

Vancouver:

Beňo M. Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/11012/188934.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Beňo M. Detekce phishingu ve webových stránkách: Phishing Detection in Web Pages. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/188934

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Arizona State University

24. Namasivayam, Bhuvana Lalitha. Categorization of Phishing Detection Features And Using the Feature Vectors to Classify Phishing Websites.

Degree: Computer Science, 2017, Arizona State University

Phishing is a form of online fraud where a spoofed website tries to gain access to user's sensitive information by tricking the user into believing… (more)

Subjects/Keywords: Computer science; classification; hosting domain; Neural networks; Phishing; predict phishing; website features

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Namasivayam, B. L. (2017). Categorization of Phishing Detection Features And Using the Feature Vectors to Classify Phishing Websites. (Masters Thesis). Arizona State University. Retrieved from http://repository.asu.edu/items/45018

Chicago Manual of Style (16th Edition):

Namasivayam, Bhuvana Lalitha. “Categorization of Phishing Detection Features And Using the Feature Vectors to Classify Phishing Websites.” 2017. Masters Thesis, Arizona State University. Accessed July 03, 2020. http://repository.asu.edu/items/45018.

MLA Handbook (7th Edition):

Namasivayam, Bhuvana Lalitha. “Categorization of Phishing Detection Features And Using the Feature Vectors to Classify Phishing Websites.” 2017. Web. 03 Jul 2020.

Vancouver:

Namasivayam BL. Categorization of Phishing Detection Features And Using the Feature Vectors to Classify Phishing Websites. [Internet] [Masters thesis]. Arizona State University; 2017. [cited 2020 Jul 03]. Available from: http://repository.asu.edu/items/45018.

Council of Science Editors:

Namasivayam BL. Categorization of Phishing Detection Features And Using the Feature Vectors to Classify Phishing Websites. [Masters Thesis]. Arizona State University; 2017. Available from: http://repository.asu.edu/items/45018


UCLA

25. Rajput, Prashant Hari Narayan. Phish Muzzle: This Fish Won't Bite.

Degree: Computer Science, 2017, UCLA

Phishing as an attempt to obtain sensitive information from users using deceitful methods.Email Phishing is done using email as the method of delivery for the… (more)

Subjects/Keywords: Computer science; Computer engineering; Business Email Compromise; Email Phishing; Email Security; Email Spam; Outlook plugin; Phishing Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rajput, P. H. N. (2017). Phish Muzzle: This Fish Won't Bite. (Thesis). UCLA. Retrieved from http://www.escholarship.org/uc/item/2ks9x26r

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rajput, Prashant Hari Narayan. “Phish Muzzle: This Fish Won't Bite.” 2017. Thesis, UCLA. Accessed July 03, 2020. http://www.escholarship.org/uc/item/2ks9x26r.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rajput, Prashant Hari Narayan. “Phish Muzzle: This Fish Won't Bite.” 2017. Web. 03 Jul 2020.

Vancouver:

Rajput PHN. Phish Muzzle: This Fish Won't Bite. [Internet] [Thesis]. UCLA; 2017. [cited 2020 Jul 03]. Available from: http://www.escholarship.org/uc/item/2ks9x26r.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rajput PHN. Phish Muzzle: This Fish Won't Bite. [Thesis]. UCLA; 2017. Available from: http://www.escholarship.org/uc/item/2ks9x26r

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mississippi State University

26. McRae, Craig Michael. USING WEB BUGS AND HONEYTOKENS TO INVESTIGATE THE SOURCE OF PHISHING ATTACKS.

Degree: MS, Computer Science and Engineering, 2008, Mississippi State University

Phishing is the use of social engineering and electronic communications such as emails to try and illicit sensitive information such as usernames, passwords, and financial… (more)

Subjects/Keywords: investigation; tracking; web bugs; honeytokens; anti-phishing; phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McRae, C. M. (2008). USING WEB BUGS AND HONEYTOKENS TO INVESTIGATE THE SOURCE OF PHISHING ATTACKS. (Masters Thesis). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012008-220800/ ;

Chicago Manual of Style (16th Edition):

McRae, Craig Michael. “USING WEB BUGS AND HONEYTOKENS TO INVESTIGATE THE SOURCE OF PHISHING ATTACKS.” 2008. Masters Thesis, Mississippi State University. Accessed July 03, 2020. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012008-220800/ ;.

MLA Handbook (7th Edition):

McRae, Craig Michael. “USING WEB BUGS AND HONEYTOKENS TO INVESTIGATE THE SOURCE OF PHISHING ATTACKS.” 2008. Web. 03 Jul 2020.

Vancouver:

McRae CM. USING WEB BUGS AND HONEYTOKENS TO INVESTIGATE THE SOURCE OF PHISHING ATTACKS. [Internet] [Masters thesis]. Mississippi State University; 2008. [cited 2020 Jul 03]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012008-220800/ ;.

Council of Science Editors:

McRae CM. USING WEB BUGS AND HONEYTOKENS TO INVESTIGATE THE SOURCE OF PHISHING ATTACKS. [Masters Thesis]. Mississippi State University; 2008. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04012008-220800/ ;


KTH

27. Barrios, Karolina. Social manipulation och phishing : Vilka brister finns i dagens skydd och hur kan de förbättras?.

Degree: Electrical Engineering and Computer Science (EECS), 2019, KTH

Företag och privatpersoner i dagens samhälle måste skydda sig mot olika typer av cyberattacker. Attackerna finns i olika former där phishingattacker är ett av… (more)

Subjects/Keywords: Social manipulation; phishing; e-post; skydd; medvetenhet; brister; Social engineering; phishing; mail; protection; awareness; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barrios, K. (2019). Social manipulation och phishing : Vilka brister finns i dagens skydd och hur kan de förbättras?. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-269527

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barrios, Karolina. “Social manipulation och phishing : Vilka brister finns i dagens skydd och hur kan de förbättras?.” 2019. Thesis, KTH. Accessed July 03, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-269527.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barrios, Karolina. “Social manipulation och phishing : Vilka brister finns i dagens skydd och hur kan de förbättras?.” 2019. Web. 03 Jul 2020.

Vancouver:

Barrios K. Social manipulation och phishing : Vilka brister finns i dagens skydd och hur kan de förbättras?. [Internet] [Thesis]. KTH; 2019. [cited 2020 Jul 03]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-269527.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barrios K. Social manipulation och phishing : Vilka brister finns i dagens skydd och hur kan de förbättras?. [Thesis]. KTH; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-269527

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brigham Young University

28. Henshaw, James Presley. Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks.

Degree: MS, 2005, Brigham Young University

Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company… (more)

Subjects/Keywords: phishing; internet security; trust negotiation; Phishing Warden; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henshaw, J. P. (2005). Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd

Chicago Manual of Style (16th Edition):

Henshaw, James Presley. “Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks.” 2005. Masters Thesis, Brigham Young University. Accessed July 03, 2020. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd.

MLA Handbook (7th Edition):

Henshaw, James Presley. “Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks.” 2005. Web. 03 Jul 2020.

Vancouver:

Henshaw JP. Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks. [Internet] [Masters thesis]. Brigham Young University; 2005. [cited 2020 Jul 03]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd.

Council of Science Editors:

Henshaw JP. Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks. [Masters Thesis]. Brigham Young University; 2005. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd


Brno University of Technology

29. Tlusťák, Karel. Problematika emailové komunikace: Email Communication Problematics.

Degree: 2019, Brno University of Technology

 This work describes actual problems regarding to email communication. It shows how emails technically work and on these bases describes today's possibilities of email authentication.… (more)

Subjects/Keywords: phishing; email; spam; model OPT-IN; model OPT-OUT; phishing; email; spam; OPT-IN model; OPT-OUT model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tlusťák, K. (2019). Problematika emailové komunikace: Email Communication Problematics. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/55630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tlusťák, Karel. “Problematika emailové komunikace: Email Communication Problematics.” 2019. Thesis, Brno University of Technology. Accessed July 03, 2020. http://hdl.handle.net/11012/55630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tlusťák, Karel. “Problematika emailové komunikace: Email Communication Problematics.” 2019. Web. 03 Jul 2020.

Vancouver:

Tlusťák K. Problematika emailové komunikace: Email Communication Problematics. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/11012/55630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tlusťák K. Problematika emailové komunikace: Email Communication Problematics. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/55630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

30. Zelinka, Petr. Kriminalita na internetu: Internet Criminality.

Degree: 2019, Brno University of Technology

 This diploma thesis focuses on the problem of internet crime in the Czech Republic and in the world. It describes and analyses various types of… (more)

Subjects/Keywords: Autorské právo; cracker; hacker; internet; kriminalita; malware; phishing; spamming; vir; warez.; Copyright; cracker; hacker; internet; criminality; malware; phishing; spamming; virus; warez.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zelinka, P. (2019). Kriminalita na internetu: Internet Criminality. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/3459

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zelinka, Petr. “Kriminalita na internetu: Internet Criminality.” 2019. Thesis, Brno University of Technology. Accessed July 03, 2020. http://hdl.handle.net/11012/3459.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zelinka, Petr. “Kriminalita na internetu: Internet Criminality.” 2019. Web. 03 Jul 2020.

Vancouver:

Zelinka P. Kriminalita na internetu: Internet Criminality. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Jul 03]. Available from: http://hdl.handle.net/11012/3459.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zelinka P. Kriminalita na internetu: Internet Criminality. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/3459

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5]

.