Evaluation of Field Phishing Study Setup Method

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An interdiscplinary study of phishing and spear-phishing attacks

In a world where spear-phishing is one of the most common attacks used to steal confidential data, it is necessary to instruct technical and non-technical users about new mechanisms attackers can use to generate these attacks. We want to focus on phishing attacks, where a social engineer communicates a deceitful message to their victims in order to obtain some confidential information, because ...

متن کامل

Chapter 6 Phishing Susceptibility Study

Phishing attacks, in which scammers send emails and other messages to con victims into providing their login credentials and personal information, snare millions of victims each year [43]. A variety of efforts aim to combat phishing through law enforcement, automated detection, and end-user education. Researchers have studied why people fall for phishing attacks; however, little research has be...

متن کامل

Statistical evaluation of a novel SSVEP-BCI stimulation setup based on depth-of-field

Introduction: The main drawback of a Brain-computer Interface based on Steady-State Visual Evoked Potential (SSVEP-BCI) that detects the emergence of visual evoked potentials (VEP) in reaction to flickering stimuli is its muscular dependence due to users must redirect their gaze to put the target stimulus in their field of view. In this work, a novel setup is evaluated in which two stimuli are ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information and Network Security (IJINS)

سال: 2012

ISSN: 2089-3299

DOI: 10.11591/ijins.v1i4.776