Phishing attacks and defenses

81Citations
Citations of this article
271Readers
Mendeley users who have this article in their library.

Abstract

A phishing attack is a method of tricking users into unknowingly providing personal and financial information or sending funds to attackers. The most common phishing attacks use some form of electronic messaging such as email to provide a link to what appears to be a legitimate site but is actually a malicious site controlled by the attacker. Phishing is a hybrid attack combining both social engineering and technological aspects and combatting phishing attacks requires dealing with both aspects.

References Powered by Scopus

Why phishing works

947Citations
N/AReaders
Get full text

Social phishing

829Citations
N/AReaders
Get full text

The state of phishing attacks

376Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Deep learning and big data technologies for IoT security

280Citations
N/AReaders
Get full text

A survey of phishing attacks: Their types, vectors and technical approaches

212Citations
N/AReaders
Get full text

Harnessing artificial intelligence capabilities to improve cybersecurity

171Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Chaudhry, J. A., Chaudhry, S. A., & Rittenhouse, R. G. (2016). Phishing attacks and defenses. International Journal of Security and Its Applications, 10(1), 247–256. https://doi.org/10.14257/ijsia.2016.10.1.23

Readers over time

‘16‘17‘18‘19‘20‘21‘22‘23‘24‘25015304560

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 82

73%

Researcher 15

13%

Lecturer / Post doc 11

10%

Professor / Associate Prof. 4

4%

Readers' Discipline

Tooltip

Computer Science 110

80%

Engineering 14

10%

Business, Management and Accounting 8

6%

Social Sciences 5

4%

Save time finding and organizing research with Mendeley

Sign up for free
0