Early Phishing
@article{Rekouche2011EarlyP, title={Early Phishing}, author={Koceilah Rekouche}, journal={ArXiv}, year={2011}, volume={abs/1106.4692} }
The history of phishing traces back in important ways to the mid-1990s when hacking software facilitated the mass targeting of people in password stealing scams on America Online (AOL). The first of these software programs was mine, called AOHell, and it was where the word phishing was coined. The software provided an automated password and credit card-stealing mechanism starting in January 1995. Though the practice of tricking users in order to steal passwords or information possibly goes back…
13 Citations
Phishing Email Detection Using Natural Language Processing Techniques: A Literature Survey
- Computer ScienceACLING
- 2021
A PARALLEL AVERAGED NEURAL NETWORK APPROACH FOR DETECTING SMARTPHONE PHISHES
- Computer ScienceJOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
- 2020
A parallel defending approach to classifying messages as harm or spams using the Graphics Processing Unit (GPU) platform, which is achieved in logarithmic time of O(n log n) is proposed and also discusses the future scope.
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
- Computer ScienceFuture Internet
- 2020
The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use ofphishing prevention techniques, in addition to encouraging discourse among the professional community about this topic.
Machine Learning Based Prediction versus Human-asa-Security-Sensor
- Computer Science
- 2019
Phishing is a cyber attack that aims at gathering sensitive personal information such as financial account login credentials, credit card details, social security number, etc. through human…
Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks
- Computer Science
- 2017
This thesis defines the terminology of a semantic attack, introducing a historic time-line of attack incidents over the last 17 years to illustrate what is an existential relationship with the user-computer interface and it's ever expanding landscape, and proposes a technical framework that aims to utilise the concept of Human-as-a-Security-Sensor as a dynamic defence mechanism against semantic attacks.
American and Indian Conceptualizations of Phishing
- Psychology2013 Third Workshop on Socio-Technical Aspects in Security and Trust
- 2013
Using Amazon's Mechanical Turk, fifty American and sixty-one Indian participants completed a survey that assessed characteristics of phishing attacks, asked participants to describe their previous…
Effectiveness of and user preferences for security awareness training methodologies
- Computer ScienceHeliyon
- 2019
On Cyber Crimes and Cyber Security
- Computer ScienceDevelopments in Information Security and Cybernetic Wars
- 2019
This chapter covers the definitions, types, and intrusions of e-crimes, and has also focused on the laws against e-Crimes in different countries.
In-nimbo sandboxing
- Computer ScienceHotSoS '14
- 2014
An in-nimbo sandbox for Adobe Reader was built, thwarting several examples of existing PDF-based malware and it was found that the added increment of latency, perhaps surprisingly, does not overly impair the user experience with respect to performance or usability.
A General Methodology to Optimize and Benchmark Edge Devices
- Computer Science
- 2020
A macro level methodology that iteratively benchmarks and optimizes specific workloads on edge devices and frames the validation tests with a family of network security monitoring applications an end to end scenario fully exercises and validates the developed process.