Evaluation of Field Phishing Study Setup Method
نویسندگان
چکیده
منابع مشابه
An interdiscplinary study of phishing and spear-phishing attacks
In a world where spear-phishing is one of the most common attacks used to steal confidential data, it is necessary to instruct technical and non-technical users about new mechanisms attackers can use to generate these attacks. We want to focus on phishing attacks, where a social engineer communicates a deceitful message to their victims in order to obtain some confidential information, because ...
متن کاملChapter 6 Phishing Susceptibility Study
Phishing attacks, in which scammers send emails and other messages to con victims into providing their login credentials and personal information, snare millions of victims each year [43]. A variety of efforts aim to combat phishing through law enforcement, automated detection, and end-user education. Researchers have studied why people fall for phishing attacks; however, little research has be...
متن کاملStatistical evaluation of a novel SSVEP-BCI stimulation setup based on depth-of-field
Introduction: The main drawback of a Brain-computer Interface based on Steady-State Visual Evoked Potential (SSVEP-BCI) that detects the emergence of visual evoked potentials (VEP) in reaction to flickering stimuli is its muscular dependence due to users must redirect their gaze to put the target stimulus in their field of view. In this work, a novel setup is evaluated in which two stimuli are ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information and Network Security (IJINS)
سال: 2012
ISSN: 2089-3299
DOI: 10.11591/ijins.v1i4.776