{"id":"https://openalex.org/W7135203901","doi":"https://doi.org/10.1007/s10207-026-01238-w","title":"Analysis and testing of systems countering phishing and social engineering attacks at the corporate level","display_name":"Analysis and testing of systems countering phishing and social engineering attacks at the corporate level","publication_year":2026,"publication_date":"2026-03-13","ids":{"openalex":"https://openalex.org/W7135203901","doi":"https://doi.org/10.1007/s10207-026-01238-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-026-01238-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01238-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01238-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01238-w.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128926388","display_name":"Opirskyy Ivan","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Opirskyy Ivan","raw_affiliation_strings":["Department of Information Protection, Institute of Computer Technologies, Automation and Metrology, Lviv Polytechnic National University, Lviv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Information Protection, Institute of Computer Technologies, Automation and Metrology, Lviv Polytechnic National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128979937","display_name":"Lys Stepan","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Lys Stepan","raw_affiliation_strings":["Department of Information Protection, Institute of Computer Technologies, Automation and Metrology, Lviv Polytechnic National University, Lviv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Information Protection, Institute of Computer Technologies, Automation and Metrology, Lviv Polytechnic National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129064455","display_name":"Shakh Vladyslav","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Shakh Vladyslav","raw_affiliation_strings":["Department of Information Protection, Institute of Computer Technologies, Automation and Metrology, Lviv Polytechnic National University, Lviv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Information Protection, Institute of Computer Technologies, Automation and Metrology, Lviv Polytechnic National University, Lviv, Ukraine","institution_ids":["https://openalex.org/I98435010"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5128979937"],"corresponding_institution_ids":["https://openalex.org/I98435010"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76447494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9452999830245972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9452999830245972,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.010200000368058681,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.006500000134110451,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7930999994277954},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.5564000010490417},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.5105000138282776},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4277999997138977},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.413100004196167},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3917999863624573}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7930999994277954},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6977999806404114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.589900016784668},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.5564000010490417},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.5105000138282776},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4277999997138977},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.413100004196167},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3917999863624573},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.35580000281333923},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.329800009727478},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2973000109195709},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.29179999232292175},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C151223460","wikidata":"https://www.wikidata.org/wiki/Q1277601","display_name":"Function point","level":4,"score":0.26589998602867126},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-026-01238-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01238-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01238-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-026-01238-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-026-01238-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-026-01238-w.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.5226948857307434}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7135203901.pdf","grobid_xml":"https://content.openalex.org/works/W7135203901.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W2153245338","https://openalex.org/W2521132308","https://openalex.org/W2563320891","https://openalex.org/W2771076374","https://openalex.org/W2794598542","https://openalex.org/W2802665741","https://openalex.org/W2887983501","https://openalex.org/W2944677183","https://openalex.org/W2954755749","https://openalex.org/W3167268333","https://openalex.org/W3174387132","https://openalex.org/W3183615687","https://openalex.org/W3200431970","https://openalex.org/W4221162511","https://openalex.org/W4225586039","https://openalex.org/W4292640733","https://openalex.org/W4297141066","https://openalex.org/W4313328427","https://openalex.org/W4362719792","https://openalex.org/W4381952831","https://openalex.org/W4384920433","https://openalex.org/W4385559099","https://openalex.org/W4388020458","https://openalex.org/W4392391284","https://openalex.org/W4402420873","https://openalex.org/W4403124150","https://openalex.org/W4406088251","https://openalex.org/W4408288399","https://openalex.org/W4410356245"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"This":[1],"study":[2],"aims":[3],"to":[4,19,89],"analyze":[5],"the":[6,71,110,120,136],"shortcomings":[7],"of":[8,98,122,159],"current":[9],"corporate":[10,53,76],"defenses":[11],"against":[12],"phishing":[13,80],"and":[14,18,21,31,43,59,82,93,104,125,155,170],"social":[15],"engineering":[16],"attacks":[17],"design":[20],"experimentally":[22],"evaluate":[23],"a":[24,51,56],"multi-layered":[25],"protection":[26],"model":[27],"integrating":[28],"technical,":[29],"organizational,":[30],"behavioral":[32],"controls.":[33],"A":[34],"hybrid":[35],"research":[36],"approach":[37],"combined":[38],"analytical":[39],"review,":[40],"quantitative":[41],"evaluation,":[42],"experimental":[44],"testing.":[45],"Empirical":[46],"experiments":[47],"were":[48,68,87],"conducted":[49],"in":[50],"simulated":[52],"environment":[54],"including":[55],"mail":[57],"server":[58],"filtering":[60],"nodes.":[61],"Three":[62],"open-source":[63],"filters":[64,101],"(Rspamd,":[65,102],"SpamAssassin,":[66,103],"Dspam)":[67,105],"compared":[69],"using":[70,109],"SpamAssassin":[72,111],"Public":[73,112],"Corpus.":[74,113],"Additionally,":[75],"training":[77,167],"data":[78],"from":[79],"simulations":[81],"endpoint":[83],"security":[84],"performance":[85],"tests":[86],"analyzed":[88],"assess":[90],"user":[91],"behavior":[92],"system":[94],"resilience.":[95],"Comparative":[96],"testing":[97,144],"three":[99],"email":[100],"was":[106,133],"carried":[107],"out":[108],"The":[114],"evaluation":[115],"considered":[116],"detection":[117],"accuracy,":[118],"recall,":[119],"number":[121],"false":[123,164],"positives,":[124],"resource":[126],"consumption.":[127],"Based":[128],"on":[129],"these":[130],"results,":[131],"Rspamd":[132],"recommended":[134],"as":[135],"most":[137],"balanced":[138],"option":[139],"for":[140],"practical":[141],"implementation.":[142],"Endpoint":[143],"further":[145],"demonstrated":[146],"that":[147],"properly":[148],"configured":[149],"systems":[150],"with":[151,162],"OSSEC,":[152],"ClamAV,":[153],"YARA,":[154],"Sysmon":[156],"blocked":[157],"97%":[158],"malicious":[160],"samples":[161],"minimal":[163],"positives.":[165],"Segmenting":[166],"by":[168],"function":[169],"experience,":[171],"alongside":[172],"immediate":[173],"\u201cclick-based\u201d":[174],"feedback,":[175],"proved":[176],"far":[177],"more":[178],"effective":[179],"than":[180],"traditional":[181],"awareness":[182],"sessions.":[183]},"counts_by_year":[],"updated_date":"2026-03-15T07:15:06.534987","created_date":"2026-03-14T00:00:00"}
