Keywords: فیشینگ; Phishing; Neuro-Fuzzy scheme; Legitimate site rules; Online transaction
مقالات ISI ترجمه شده فیشینگ
Keywords: فیشینگ; Phishing; Fuzzy logic; Data mining; Classification; Association; Apriori; E-banking risk assessment
مقالات ISI فیشینگ (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: فیشینگ; Phishing; Support vector machine; ANFIS; Online transaction; Intelligent system;
Keywords: فیشینگ; Judgment analysis; Lens model; Linear regression; Phishing; Cybersecurity;
Keywords: فیشینگ; Classification; Computer security; Phishing; Machine learning; Web security; Security awareness;
Keywords: فیشینگ; Phishing; Organisational behavior; Human factors; Cyber security; Employee susceptibility; Social engineering;
Keywords: فیشینگ; Cybersecurity; Data mining; Features extraction; Phishing; Expert rules; Web threats; Visualization;
Keywords: فیشینگ; Phishing; Deception; Human behavior; Personality; Dark triad;
Keywords: فیشینگ; Influence; Individual differences; Cyber security; Online scams; Phishing;
Keywords: فیشینگ; Phishing; Anti-phishing framework; E-commerce security; Target Domain Identification;
Keywords: فیشینگ; Priming; Warning; prevention; Social engineering; Phishing; Disclosure of personal information;
Keywords: فیشینگ; Web; Phishing; Susceptibility; Single Sign-On; Toolkit;
Keywords: فیشینگ; Phishing; Internet security; Easy-to-hard effect; Human-computer interaction; Discrimination learning; Visual discrimination;
Keywords: فیشینگ; Phishing; Social media; Social networking-based phishing; Online deception; Heuristic-systematic model (HSM); Cognitive processing; Interface affordance; Device affordance;
Keywords: فیشینگ; Phishing; Social engineering; Phishing detection; Mobile phishing; Social networks phishing; Honeypots; Ontology;
Keywords: فیشینگ; Internet self-efficacy; Phishing; Anti-phishing self-efficacy; Anti-phishing behavior;
Keywords: فیشینگ; Phishing; Habit strength; Heuristic processing; Device affordance; Deception;
Keywords: فیشینگ; Information security awareness; Phishing; Social engineering; Information security behaviour; Trust; Perceptual differences
Keywords: فیشینگ; Cybercrime; Economic analysis; Information security; Phishing; Simulation; @Risk;
Keywords: فیشینگ; Phishing; Search engine; Lightweight; Google; Chrome;
Keywords: فیشینگ; Phishing; Information security; Security behaviours; Email security; Security training;
Keywords: فیشینگ; Phishing; Anti-phishing; Data mining; Blacklist; Whitelist;
Keywords: فیشینگ; Phishing; Anti-phishing; E-commerce security; Target domain detection
Keywords: فیشینگ; Classification; Data mining; Forged websites; Phishing; Internet security
Keywords: فیشینگ; Abnormal returns; Event study; Financial holding companies; Firm value; Phishing; Trading volume;
Keywords: فیشینگ; Phishing; Anti-phishing; Anti-phishing framework; E-commerce security; Machine learning
Keywords: فیشینگ; Phishing; Internet banking; Classification; SVM; Sensitivity analysis; Browser extension; Rule-based
Keywords: فیشینگ; Phishing; Eye tracking; Usable security; User study
Keywords: فیشینگ; Cybercrime; Phishing; Identity theft; Routine activities theory; Online deviance
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks
Keywords: فیشینگ; Phishing; Malicious browser extension; Bluetooth; RT MITM; CR MITM; Authentication; Chrome; Smartphone; Credentials; Deception; Multifactor authentication; QR code; OTP; CAPTCHA;
Mind your SMSes: Mitigating social engineering in second factor authentication
Keywords: فیشینگ; Phishing; 2-factor authentication; 2-step verification; SMS; Verification code forwarding attack; Human factors; Warning;
A pharming attack hybrid detection model based on IP addresses and web content
Keywords: فیشینگ; Pharming; Phishing; Page content; Hybrid model; IP address
Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system
Keywords: فیشینگ; E-banking; Phishing; Fraud detection; Fuzzy expert system; Rough sets theory
Security Busters: Web browser security vs. rogue sites
Keywords: فیشینگ; Android; iOS; Malware; Mobile device; Phishing; Smartphone; Security; Windows; Web browser
Investigating phishing victimization with the Heuristic–Systematic Model: A theoretical framework and an exploration
Keywords: فیشینگ; Phishing; Victimization; Explorative study; Social engineering; Heuristic–Systematic Model
A multi-tier phishing detection and filtering approach
Keywords: فیشینگ; Phishing; Machine learning; Multi-tier classifier; Analyser
Trustworthiness testing of phishing websites: A behavior model-based approach
Keywords: فیشینگ; Phishing; Trustworthiness testing; Behavior model; Heuristic coverage
Socio-technological phishing prevention
Keywords: فیشینگ; Phishing; Identity theft; e-stealing; e-theft
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
Keywords: فیشینگ; Social engineering; Phishing; Phishing vulnerability; Information processing; Message cues; Attention; Elaboration
Assessing the severity of phishing attacks: A hybrid data mining approach
Keywords: فیشینگ; Financial loss; Phishing; Risk; Supervised classification; Text phrase extraction; Variable importance
The dark side of the Internet: Attacks, costs and responses
Keywords: فیشینگ; Spam; Malware; Hacking; Phishing; Denial of service attack; Click fraud; Online piracy; Digital rights management; Online frauds; Online gambling; Cyber warfare
Discovering phishing target based on semantic link network
Keywords: فیشینگ; Phishing; Anti-phishing; Semantic Link Network; Web document analysis
It won’t happen to me: Promoting secure behaviour among internet users
Keywords: فیشینگ; Security; Risk perception; Risk information; Training; Phishing; Internet
Why Johnny can't surf (safely)? Attacks and defenses for web users
Keywords: فیشینگ; Secure usability; Phishing; Spoofing; Secure login; Network security; Web security
DNS-based email sender authentication mechanisms: A critical review
Keywords: فیشینگ; Email; Spam; Phishing; SPF; DKIM; Sender-ID; SIDF; SMTP; Internet security
SSL/TLS session-aware user authentication revisited
Keywords: فیشینگ; Electronic commerce; Security; Phishing; Man-in-the-middle attack; SSL/TLS protocol; SSL/TLS session-aware user authentication
Impersonator identification through dynamic fingerprinting
Keywords: فیشینگ; Digital watermark; Phishing; Intellectual property; Forensics; Fingerprinting; Impersonation
Phishing for user security awareness
Keywords: فیشینگ; Phishing; Email security; Social engineering; Security training; Information assurance; Spam; Computer user education