Phishing Attacks Survey: Types, Vectors, and Technical Approaches
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
- Bostick, T.P. & Connelly, E.B. & Lambert, J.H. & Linkov, I., 2018. "Resilience science, policy and investment for civil infrastructure," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 19-23.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Joakim Kävrestad & Allex Hagberg & Marcus Nohlberg & Jana Rambusch & Robert Roos & Steven Furnell, 2022. "Evaluation of Contextual and Game-Based Training for Phishing Detection," Future Internet, MDPI, vol. 14(4), pages 1-16, March.
- Muhammad Waqas & Alishba Hania & Farzan Yahya & Iqra Malik, 2023. "Enhancing Cybersecurity: The Crucial Role of Self-Regulation, Information Processing, and Financial Knowledge in Combating Phishing Attacks," SAGE Open, , vol. 13(4), pages 21582440231, December.
- Kausar Yasmeen & Muhammad Adnan, 2023. "Zero-day and zero-click attacks on digital banking: a comprehensive review of double trouble," Risk Management, Palgrave Macmillan, vol. 25(4), pages 1-24, December.
- Jimmy Moedjahedy & Arief Setyanto & Fawaz Khaled Alarfaj & Mohammed Alreshoodi, 2022. "CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning," Future Internet, MDPI, vol. 14(8), pages 1-18, July.
- Ravi Kashyap, 2023. "DeFi Security: Turning The Weakest Link Into The Strongest Attraction," Papers 2312.00033, arXiv.org.
- Padmalochan Panda & Alekha Kumar Mishra & Deepak Puthal, 2022. "A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems," Future Internet, MDPI, vol. 14(8), pages 1-17, August.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
- Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Xiansheng Chen & Ruisong Quan, 2021. "A spatiotemporal analysis of urban resilience to the COVID-19 pandemic in the Yangtze River Delta," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 106(1), pages 829-854, March.
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Suyuan Luo & Tsan‐Ming Choi, 2022. "E‐commerce supply chains with considerations of cyber‐security: Should governments play a role?," Production and Operations Management, Production and Operations Management Society, vol. 31(5), pages 2107-2126, May.
- Xiaoge Zhang & Sankaran Mahadevan & Kai Goebel, 2019. "Network Reconfiguration for Increasing Transportation System Resilience Under Extreme Events," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 2054-2075, September.
- Mark C. Quigley & Januka Attanayake & Andrew King & Fabian Prideaux, 2020. "A multi-hazards earth science perspective on the COVID-19 pandemic: the potential for concurrent and cascading crises," Environment Systems and Decisions, Springer, vol. 40(2), pages 199-215, June.
- Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
- Maureen S. Golan & Laura H. Jernegan & Igor Linkov, 2020. "Trends and applications of resilience analytics in supply chain modeling: systematic literature review in the context of the COVID-19 pandemic," Environment Systems and Decisions, Springer, vol. 40(2), pages 222-243, June.
- Scholz, Roland W. & Czichos, Reiner & Parycek, Peter & Lampoltshammer, Thomas J., 2020. "Organizational vulnerability of digital threats: A first validation of an assessment method," European Journal of Operational Research, Elsevier, vol. 282(2), pages 627-643.
- Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
- Zhiheng Xu & Jun Zhuang, 2019. "A Study on a Sequential One‐Defender‐N‐Attacker Game," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1414-1432, June.
- Aniruddha Bagchi & Tridib Bandyopadhyay, 2018. "Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism," Decision Analysis, INFORMS, vol. 15(3), pages 174-193, September.
- Ali Pala & Jun Zhuang, 2019. "Information Sharing in Cybersecurity: A Review," Decision Analysis, INFORMS, vol. 16(3), pages 172-196, September.
- Ebina, Takeshi & Matsushima, Noriaki & Nishide, Katsumasa, 2022.
"Demand uncertainty, product differentiation, and entry timing under spatial competition,"
European Journal of Operational Research, Elsevier, vol. 303(1), pages 286-297.
- Takeshi Ebina & Noriaki Matsushima & Katsumasa Nishide, 2017. "Demand uncertainty, product differentiation, and entry timing under spatial competition," ISER Discussion Paper 1007r, Institute of Social and Economic Research, Osaka University, revised Jul 2018.
- Pennetti, Cody A. & Fontaine, Michael D. & Jun, Jungwook & Lambert, James H., 2020. "Evaluating capacity of transportation operations with highway travel time reliability," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Liu, Wei & Song, Zhaoyang, 2020. "Review of studies on the resilience of urban critical infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Zhao, Taiyi & Tang, Yuchun & Li, Qiming & Wang, Jingquan, 2023. "Resilience-oriented network reconfiguration strategies for community emergency medical services," Reliability Engineering and System Safety, Elsevier, vol. 231(C).
- Jie Zhao & Ji Yun Lee & Dane Camenzind & Michael Wolcott & Kristin Lewis & Olivia Gillham, 2023. "Multi-Component Resilience Assessment Framework for a Supply Chain System," Sustainability, MDPI, vol. 15(7), pages 1-25, April.
More about this item
Keywords
phishing attacks; phishing types; phishing vectors; phishing technical approaches;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:12:y:2020:i:10:p:168-:d:421901. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.