{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:41:10Z","timestamp":1776102070437,"version":"3.50.1"},"reference-count":92,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:00:00Z","timestamp":1601424000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007613","name":"Majmaah University","doi-asserted-by":"publisher","award":["will be given after acceptance"],"award-info":[{"award-number":["will be given after acceptance"]}],"id":[{"id":"10.13039\/501100007613","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic.<\/jats:p>","DOI":"10.3390\/fi12100168","type":"journal-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T09:41:01Z","timestamp":1601458861000},"page":"168","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":182,"title":["Phishing Attacks Survey: Types, Vectors, and Technical Approaches"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2410-486X","authenticated-orcid":false,"given":"Rana","family":"Alabdan","sequence":"first","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Majmaah University, Majmaah 11952, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Stavroulakis, P., and Stamp, M. (2010). Handbook of Information and Communication Security, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-04117-4"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., and Myers, S. (2006). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, Wiley.","DOI":"10.1002\/0470086106"},{"key":"ref_3","unstructured":"Rekouche, K. (2011). Early Phishing. arXiv."},{"key":"ref_4","first-page":"23","article-title":"Phishing Techniques and Mitigating the Associated Security Risks","volume":"5","author":"Rader","year":"2013","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"ref_5","unstructured":"Symantec (2019). ISTR Internet Security Threat Report 2019. Symantec, 24, 61. Available online: https:\/\/docs.broadcom.com\/doc\/istr-15-april-volume-20-en."},{"key":"ref_6","unstructured":"Symantec (2015). ISTR Internet Security Threat Report 2015. Symantec, 20, Available online: https:\/\/docs.broadcom.com\/doc\/istr-24-2019-en."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Anti Phishing Working Group (2019, December 15). Phishing Activity Trends Report: 3rd Quarter2019. Available online: https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q3_2019.pdf.","DOI":"10.1016\/S1361-3723(19)30025-9"},{"key":"ref_8","unstructured":"APWG (2019, December 27). Phishing Activity Trends Reports. Available online: https:\/\/apwg.org\/trendsreports\/."},{"key":"ref_9","unstructured":"Symantec (2019, December 15). ISTR Internet Security Threat Report Volume 23. Available online: https:\/\/www.phishingbox.com\/assets\/files\/images\/Symantec-Internet-Security-Threat-Report-2018.pdf."},{"key":"ref_10","unstructured":"IBM (2019, December 15). IBM X-Force Threat Intelligence Index 2019. Available online: https:\/\/www.securindex.com\/downloads\/8b9f94c46a70c60b229b04609c07acff.pdf."},{"key":"ref_11","unstructured":"ICC (IC3)\/Federal Bureau of Investigation (FBI) (2019, December 20). Internet Crime Report 2018, Available online: https:\/\/www.fbi.gov\/news\/stories\/ic3-releases-2018-internet-crime-report-042219."},{"key":"ref_12","unstructured":"Seals, T. (2019). Elder Scrolls Online Targeted by Cybercrooks Hunting In-Game Loot. Threatpost, Available online: https:\/\/threatpost.com\/elder-scrolls-online-cybercrooks-in-game-loot\/150934\/."},{"key":"ref_13","unstructured":"Zetter, K. (2018). Inside the Cunning, Unprecedented Hack of Ukraine\u2019s Power Grid. WIRED, Available online: https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","article-title":"A survey of phishing attacks: Their types, vectors and technical approaches","volume":"106","author":"Chiew","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref_15","first-page":"2171","article-title":"A Review on Phishing Attacks","volume":"14","author":"Shankar","year":"2019","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Shaikh, A.N., Shabut, A.M., and Hossain, M.A. (2016, January 15\u201317). A literature review on phishing crime, prevention review and investigation of gaps. Proceedings of the 2016 10th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2016), Chengdu, China.","DOI":"10.1109\/SKIMA.2016.7916190"},{"key":"ref_17","first-page":"55","article-title":"Development Review on Phishing: A Computer Security Threat","volume":"2","author":"Chaudhary","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Sci. Manag. Stud."},{"key":"ref_18","first-page":"20","article-title":"A Review on Phishing Attacks and Various Anti Phishing Techniques","volume":"139","author":"Suganya","year":"2016","journal-title":"Int. J. Comput. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1108\/09685221211286548","article-title":"Phishing counter measures and their effectiveness\u2014Literature review","volume":"20","author":"Purkait","year":"2012","journal-title":"Inf. Manag. Comput. Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2015.04.001","article-title":"Tutorial and critical analysis of phishing websites methods","volume":"17","author":"Mohammad","year":"2015","journal-title":"Comput. Sci. Rev."},{"key":"ref_21","first-page":"23","article-title":"A Study of Social Engineering in Online Frauds","volume":"1","author":"Atkins","year":"2013","journal-title":"Open J. Soc. Sci."},{"key":"ref_22","first-page":"113","article-title":"Advanced social engineering attacks","volume":"22","author":"Krombholz","year":"2015","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_23","first-page":"1","article-title":"Online Frauds in Banks with Phishing","volume":"12","author":"Singh","year":"2007","journal-title":"J. Internet Bank. Commer."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"355","DOI":"10.23940\/ijpe.12.4.p355.mag","article-title":"Review of systems defense and attack models","volume":"8","author":"Hausken","year":"2012","journal-title":"Int. J. Perform. Eng."},{"key":"ref_25","unstructured":"Chawki, M. (2019, December 17). Phishing in Cyberspace: Issues and Solutions. Available online: http:\/\/www.crime-research.org\/articles\/phishing-in-cyberspace-issues-and-solutions."},{"key":"ref_26","unstructured":"Skog, R., and Torok, E. (2005). Multimedia Messaging Service Routing System and Method. (6947738B2), U.S. Patent."},{"key":"ref_27","unstructured":"El-Fishawy, S., and Othmer, K. (2006). Delivery of Voice Data from Multimedia Messaging Service Messages. (7,133,687 B1), U.S. Patent."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MC.2012.288","article-title":"Smartphone security challenges","volume":"45","author":"Wang","year":"2012","journal-title":"Computer"},{"key":"ref_29","first-page":"12","article-title":"Comments on \u2018an early history of the internet\u2019","volume":"49","author":"Kleinrock","year":"2011","journal-title":"IEEE Commun. Mag."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Frauenstein, E.D., and Flowerday, S.V. (2016, January 17\u201318). Social network phishing: Becoming habituated to clicks and ignorant to threats?. Proceedings of the 2016 Information Security for South Africa (ISSA), Johannesburg, South Africa.","DOI":"10.1109\/ISSA.2016.7802935"},{"key":"ref_31","first-page":"297","article-title":"Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices","volume":"5","author":"Amanor","year":"2014","journal-title":"J. Emerg. Trends Comput. Inf. Sci."},{"key":"ref_32","first-page":"1","article-title":"The Human Factor in Phishing","volume":"7","author":"Jakobsson","year":"2007","journal-title":"Priv. Secur. Consum. Inf."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Jamil, A., Asif, K., Ghulam, Z., Nazir, M.K., Alam, S.M., and Ashraf, R. (2018, January 10\u201313). MPMPA: A Mitigation and Prevention Model for Social Engineering Based Phishing attacks on Facebook. Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8622505"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2013.106","article-title":"Going spear phishing: Exploring embedded training and awareness","volume":"12","author":"Caputo","year":"2014","journal-title":"IEEE Secur. Priv."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Heartfield, R., and Loukas, G. (2015). A Taxonomy of Attacks and a Survey of Defense Mechanisms for Semantic Social Engineering Attacks. ACM Comput. Surveys.","DOI":"10.1145\/2835375"},{"key":"ref_36","first-page":"32","article-title":"Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content","volume":"26","author":"Lin","year":"2019","journal-title":"ACM Trans. Comput. Interact."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Oliveira, D., Rocha, H., Yang, H., Ellis, D., Dommaraju, S., Muradoklu, M., Weir, D., Soliman, A., Lin, T., and Ebner, N. (2017, January 6\u201311). Dissecting spear phishing emails for older vs young adults: On the interplay of weapons of influence and life domains in predicting susceptibility to phishing. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA.","DOI":"10.1145\/3025453.3025831"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","article-title":"Advanced Persistent threats and how to monitor and deter them","volume":"2011","author":"Tankard","year":"2011","journal-title":"Netw. Secur."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/2063176.2063197","article-title":"The Current State of Phishing Attacks","volume":"55","author":"Hong","year":"2012","journal-title":"Commun. ACM"},{"key":"ref_40","first-page":"5","article-title":"Study of Phishing Attacks and Preventions","volume":"163","author":"Dakpa","year":"2017","journal-title":"Int. J. Comput. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MSEC.2019.2922865","article-title":"The Rising Threat of Launchpad Attacks","volume":"17","author":"Jakobsson","year":"2019","journal-title":"IEEE Secur. Priv."},{"key":"ref_42","first-page":"A1","article-title":"Something Phish-y is Going On Here: A Teaching Case on Business Email Compromise","volume":"14","author":"Bakarich","year":"2019","journal-title":"Curr. Issues Audit."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(16)30089-6","article-title":"The imitation game: How business email compromise scams are robbing organisations","volume":"2016","year":"2016","journal-title":"Comput. Fraud Secur."},{"key":"ref_44","unstructured":"Aviv, S., Levy, Y., Wang, L., and Geri, N. (2019, January 15). An expert assessment of corporate professional users to measure business email compromise detection skills and develop a knowledge and awareness training program. Proceedings of the 14th Pre-ICIS Workshop on Information Security and Privacy, Munich, Germany."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MC.2011.261","article-title":"Defending Against Cross Site Scripting Attacks","volume":"45","author":"Shar","year":"2018","journal-title":"IEEE Comput. Soc."},{"key":"ref_46","unstructured":"Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., and Vigna, G. (March, January 28). Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. Proceedings of the Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, USA."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Gelernter, N., and Herzberg, A. (2016, January 11\u201315). Tell me about yourself: The malicious CAPTCHA Attack. Proceedings of the 25th International World Wide Web Conference (WWW 2016), Montr\u00e9al, QC, Canada.","DOI":"10.1145\/2872427.2883005"},{"key":"ref_48","unstructured":"Joshi, C. (2019). QR Codes in E-Commerce: 7 Ways Amazon is Getting It Right!. Beaconstac, Available online: https:\/\/blog.beaconstac.com\/2019\/04\/qr-codes-in-e-commerce-ways-amazon-is-getting-it-right\/."},{"key":"ref_49","first-page":"52","article-title":"QRishing: The susceptibility of smartphone users to QR code phishing attacks","volume":"Volume 7862","author":"Vidas","year":"2013","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_50","unstructured":"Mitnick, K.D., and Simon, W.L. (2003). The Art of Deception: Controlling the Human Element in Security, Wiley."},{"key":"ref_51","unstructured":"Harl, G. (2019, December 21). People Hacking\u2014The Psychology of Social Engineering. Text of Harl\u2019s Talk at Access All Areas III, Available online: https:\/\/barzha.cyberpunk.us\/lib\/cin\/se10.html."},{"key":"ref_52","first-page":"17","article-title":"Case Study On Social Engineering Techniques for Persuasion","volume":"2","author":"Hasan","year":"2010","journal-title":"Int. J. Appl. Graph Theory Wirel. Ad Hoc Netw. Sens. Netw."},{"key":"ref_53","unstructured":"Christensen, B. (2019, December 21). PHISHING SCAM\u2014\u2018Request to Terminate Microsoft Account\u2019. Hoax-Slayer. Available online: https:\/\/www.hoax-slayer.net\/phishing-scam-request-to-terminate-microsoft-account\/."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., and Nunge, E. (May, January 28). Protecting people from phishing: The design and evaluation of an embedded training email system. Proceedings of the 2007 Conference on Human Factors in Computing Systems (CHI 2007), San Jose, CA, USA.","DOI":"10.1145\/1240624.1240760"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., and Vigna, G. (2010, January 26\u201330). Detection and analysis of drive-by-download attacks and malicious JavaScript code. Proceedings of the 19th International Conference on World Wide Web (WWW 2010), Raleigh, NC, USA.","DOI":"10.1145\/1772690.1772720"},{"key":"ref_56","unstructured":"Le, V.L., Welch, I., Gao, X., and Komisarczuk, P. (2013). Anatomy of Drive-by Download Attack. Proceedings of the Proceedings of the Eleventh Australasian Information Security Conference\u2014Volume 138, Australian Computer Society, Inc."},{"key":"ref_57","unstructured":"Zhaosheng, Z., Zhi, J.F., Guohan, L., Phil, R., Yan, C., and Keesook, H. (August, January 28). Botnet research survey. Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications Conference, Turku, Finland."},{"key":"ref_58","unstructured":"Milletary, J. (2019, December 21). Technical Trends in Phishing Attacks. Available online: https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2005_019_001_50315.pdf."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Nazario, J., and Holz, T. (2008, January 7\u20138). As the net churns: Fast-flux botnet observations. Proceedings of the 3rd International Conference on Malicious and Unwanted Software (MALWARE 2008), Fairfax, VI, USA.","DOI":"10.1109\/MALWARE.2008.4690854"},{"key":"ref_60","unstructured":"Puri, R. (2019, December 21). Bots & Botnet: An Overview. SANS Institute. 2003. Puri, R. (2003). Bots & Botnet: An Overview. Available online: https:\/\/www.sans.org\/reading-room\/whitepapers\/malicious\/bots-botnet-overview-1299."},{"key":"ref_61","first-page":"1","article-title":"Examining the impact of website take-down on phishing","volume":"Volume 269","author":"Moore","year":"2007","journal-title":"Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit on\u2014eCrime \u201907"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Hausken, K. (2019, December 21). The Precautionary Principle as Multi-Period Games Where Players Have Different Thresholds for Acceptable Uncertainty. Available online: https:\/\/doi.org\/10.1016\/j.ress.2020.107224.","DOI":"10.1016\/j.ress.2020.107224"},{"key":"ref_63","first-page":"76","article-title":"Phishing\u2014A Growing Threat to E-Commerce","volume":"12","author":"Banday","year":"2011","journal-title":"Bus. Rev."},{"key":"ref_64","first-page":"72","article-title":"Behind Identity Theft and Fraud in Cyberspace: The Current Landscape of Phishing Vectors","volume":"3","author":"Nagunwa","year":"2014","journal-title":"Int. J. Cyber-Secur. Digit. Forensics"},{"key":"ref_65","first-page":"11","article-title":"Malvertising\u2014Exploiting web advertising","volume":"2011","author":"Sood","year":"2011","journal-title":"Comput. Fraud Secur."},{"key":"ref_66","first-page":"29","article-title":"Malvertising\u2014A Rising Threat to The Online Ecosystem","volume":"10","author":"Dwyer","year":"2017","journal-title":"J. Inf. Syst. Appl. Res."},{"key":"ref_67","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., and Cranor, L.F. (2009, January 10\u201314). Crying Wolf: An Empirical Study of SSL Warning Effectivenes. Proceedings of the 18th USENIX Security Symposium, Montreal, QC, Canada."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Lanze, F., Panchenko, A., Ponce-Alcaide, I., and Engel, T. (2015, January 9\u201312). Hacker\u2019s toolbox: Detecting software-based 802.11 evil twin access points. Proceedings of the 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC 2015), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2015.7157981"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MSEC.2019.2910013","article-title":"Emerging Threats in Internet of Things Voice Services","volume":"17","author":"Kumar","year":"2019","journal-title":"IEEE Secur. Priv."},{"key":"ref_70","unstructured":"Raam, M. (2019, December 27). Cain and Abel\u2014Man in the Middle (MITM) Attack Tool Explained. Available online: https:\/\/cybersguards.com\/cain-and-abel-man-in-the-middle-mitm-attack-tool-explained\/."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Chen, S., Fan, L., Chen, C., Xue, M., Liu, Y., and Xu, L. (2019). GUI-Squatting Attack: Automated Generation of Android Phishing Apps. IEEE Trans. Dependable Secur. Comput.","DOI":"10.1109\/TDSC.2019.2956035"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.cosrev.2018.05.003","article-title":"A recent review of conventional vs. automated cybersecurity anti-phishing techniques","volume":"29","author":"Qabajeh","year":"2018","journal-title":"Comput. Sci. Rev."},{"key":"ref_73","unstructured":"Misra, G., Arachchilage, N.A.G., and Berkovsky, S. (2017). Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. arXiv."},{"key":"ref_74","unstructured":"Siadati, H., Palka, S., Siegel, A., and McCoy, D. (2017, January 14). Measuring the effectiveness of embedded phishing exercises. Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2017), Vancouver, BC, Canada. Available online: https:\/\/www.researchgate.net\/publication\/319128761_Measuring_the_Effectiveness_of_Embedded_Phishing_Exercises."},{"key":"ref_75","first-page":"8","article-title":"Email Classification Using Artificial Neural Network","volume":"2","author":"Alghoul","year":"2018","journal-title":"Int. J. Acad. Eng. Res."},{"key":"ref_76","unstructured":"Ying, P., and Xuhua, D. (2006, January 11\u201315). Anomaly based web phishing page detection. Proceedings of the Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, USA."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Somesha, M., Pais, A.R., Rao, R.S., and Rathour, V.S. (2020). Efficient deep learning techniques for the detection of phishing websites. Sadhana Acad. Proc. Eng. Sci., 45.","DOI":"10.1007\/s12046-020-01392-4"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"100204","DOI":"10.1016\/j.iot.2020.100204","article-title":"Cyber resilience in firms, organizations and societies","volume":"11","author":"Hausken","year":"2020","journal-title":"Internet Things"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1016\/j.ejor.2019.01.011","article-title":"Risk analysis beyond vulnerability and resilience\u2014Characterizing the defensibility of critical systems","volume":"276","author":"Bier","year":"2019","journal-title":"Eur. J. Oper. Res."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ress.2018.02.025","article-title":"Resilience science, policy and investment for civil infrastructure","volume":"175","author":"Bostick","year":"2018","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"5421046","DOI":"10.1155\/2017\/5421046","article-title":"Phishing Detection: Analysis of Visual Similarity Based Approaches","volume":"2017","author":"Jain","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Anti Phishing Working Group (2019, December 21). Phishing Activity Trends Report: 4th Quater 2019, Available online: https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2019.pdf.","DOI":"10.1016\/S1361-3723(19)30025-9"},{"key":"ref_83","unstructured":"Anti Phishing Working Group (2019, December 21). Phishing Activity Trends Report: 2nd Quater 2020, Available online: https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q2_2020.pdf."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Dupuis, M., Geiger, T., Slayton, M., and Dewing, F. (2019, January 3\u20135). The use and non-use of cybersecurity tools among consumers: Do they want help?. Proceedings of the 20th Annual Conference on Information Technology Education (SIGITE 2019), Tacoma, WA, USA.","DOI":"10.1145\/3349266.3351419"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.cose.2017.12.006","article-title":"Mobile Phishing Attacks and Defence Mechanisms: State of Art and Open Research Challenges","volume":"73","author":"Goel","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/TDSC.2018.2864993","article-title":"Learning from the Ones That Got Away: Detecting New Forms of Phishing Attacks","volume":"15","author":"Gutierrez","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Hausken, K. (2017). Security investment, hacking, and information sharing between firms and between hackers. Games, 8.","DOI":"10.3390\/g8020023"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Wen, Z.A., Lin, Z., Chen, R., and Andersen, E. (2019). What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems\u2014CHI \u201919, ACM Press.","DOI":"10.1145\/3290605.3300338"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1080\/10242694.2016.1158440","article-title":"A cost\u2013benefit analysis of terrorist attacks","volume":"29","author":"Hausken","year":"2018","journal-title":"Def. Peace Econ."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.11591\/csit.v1i1.pp1-12","article-title":"Email Phishing: Text Classification Using Natural Language Processing","volume":"1","author":"Verma","year":"2020","journal-title":"Comput. Sci. Inf. Technol."},{"key":"ref_91","first-page":"486","article-title":"A Novel Hybrid Approach of SVM Combined with NLP and Probabilistic Neural Network for Email Phishing","volume":"10","author":"Kumar","year":"2020","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"(2019). Verizon Verizon: 2019 Data Breach Investigations Report. Comput. Fraud Secur., 2019, 4.","DOI":"10.1016\/S1361-3723(19)30060-0"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/10\/168\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:15:11Z","timestamp":1760177711000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/10\/168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,30]]},"references-count":92,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2020,10]]}},"alternative-id":["fi12100168"],"URL":"https:\/\/doi.org\/10.3390\/fi12100168","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,30]]}}}