These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
183 related articles for article (PubMed ID: 28158316)
21. How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Ge Y; Lu L; Cui X; Chen Z; Qu W Appl Ergon; 2021 Nov; 97():103526. PubMed ID: 34246073 [TBL] [Abstract][Full Text] [Related]
22. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks. Rajivan P; Gonzalez C Front Psychol; 2018; 9():135. PubMed ID: 29515478 [TBL] [Abstract][Full Text] [Related]
23. Effectiveness of and user preferences for security awareness training methodologies. Tschakert KF; Ngamsuriyaroj S Heliyon; 2019 Jun; 5(6):e02010. PubMed ID: 31338464 [TBL] [Abstract][Full Text] [Related]
24. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study. Abdelhamid M J Med Internet Res; 2020 May; 22(5):e18394. PubMed ID: 32364511 [TBL] [Abstract][Full Text] [Related]
25. Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. Lee YY; Gan CL; Liew TW Int J Environ Res Public Health; 2023 Feb; 20(4):. PubMed ID: 36834209 [TBL] [Abstract][Full Text] [Related]
26. Uncovering Susceptibility Risk to Online Deception in Aging. Ebner NC; Ellis DM; Lin T; Rocha HA; Yang H; Dommaraju S; Soliman A; Woodard DL; Turner GR; Spreng RN; Oliveira DS J Gerontol B Psychol Sci Soc Sci; 2020 Feb; 75(3):522-533. PubMed ID: 29669133 [TBL] [Abstract][Full Text] [Related]
27. The role of cue utilization in the detection of phishing emails. Sturman D; Valenzuela C; Plate O; Tanvir T; Auton JC; Bayl-Smith P; Wiggins MW Appl Ergon; 2023 Jan; 106():103887. PubMed ID: 36037654 [TBL] [Abstract][Full Text] [Related]
28. The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection. Sturman D; Bell EA; Auton JC; Breakey GR; Wiggins MW Appl Ergon; 2024 Sep; 119():104309. PubMed ID: 38729025 [TBL] [Abstract][Full Text] [Related]
29. Quantifying Phishing Susceptibility for Detection and Behavior Decisions. Canfield CI; Fischhoff B; Davis A Hum Factors; 2016 Dec; 58(8):1158-1172. PubMed ID: 27562565 [TBL] [Abstract][Full Text] [Related]
30. Comparative evaluation of machine learning algorithms for phishing site detection. Almujahid NF; Haq MA; Alshehri M PeerJ Comput Sci; 2024; 10():e2131. PubMed ID: 38983211 [TBL] [Abstract][Full Text] [Related]
31. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals. Jalali MS; Bruckes M; Westmattelmann D; Schewe G J Med Internet Res; 2020 Jan; 22(1):e16775. PubMed ID: 32012071 [TBL] [Abstract][Full Text] [Related]
32. A comprehensive survey of AI-enabled phishing attacks detection techniques. Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340 [TBL] [Abstract][Full Text] [Related]
33. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Xu T; Singh K; Rajivan P Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509 [TBL] [Abstract][Full Text] [Related]
34. Datasets for phishing websites detection. Vrbančič G; Fister I; Podgorelec V Data Brief; 2020 Dec; 33():106438. PubMed ID: 33195768 [TBL] [Abstract][Full Text] [Related]
35. An effective detection approach for phishing websites using URL and HTML features. Aljofey A; Jiang Q; Rasool A; Chen H; Liu W; Qu Q; Wang Y Sci Rep; 2022 May; 12(1):8842. PubMed ID: 35614133 [TBL] [Abstract][Full Text] [Related]
36. Susceptibility to phishing on social network sites: A personality information processing model. Frauenstein ED; Flowerday S Comput Secur; 2020 Jul; 94():101862. PubMed ID: 32501314 [TBL] [Abstract][Full Text] [Related]
37. An intelligent cyber security phishing detection system using deep learning techniques. Mughaid A; AlZu'bi S; Hnaif A; Taamneh S; Alnajjar A; Elsoud EA Cluster Comput; 2022; 25(6):3819-3828. PubMed ID: 35602317 [TBL] [Abstract][Full Text] [Related]
38. Phishing for suitable targets in the Netherlands: routine activity theory and phishing victimization. Leukfeldt ER Cyberpsychol Behav Soc Netw; 2014 Aug; 17(8):551-5. PubMed ID: 25080013 [TBL] [Abstract][Full Text] [Related]
39. Textual and visual content-based anti-phishing: a Bayesian approach. Zhang H; Liu G; Chow TW; Liu W IEEE Trans Neural Netw; 2011 Oct; 22(10):1532-46. PubMed ID: 21824844 [TBL] [Abstract][Full Text] [Related]
40. Improving the phishing website detection using empirical analysis of Function Tree and its variants. Balogun AO; Adewole KS; Raheem MO; Akande ON; Usman-Hamza FE; Mabayoje MA; Akintola AG; Asaju-Gbolagade AW; Jimoh MK; Jimoh RG; Adeyemo VE Heliyon; 2021 Jul; 7(7):e07437. PubMed ID: 34278030 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]