+

Bhavsar et al., 2018 - Google Patents

Study on phishing attacks

Bhavsar et al., 2018

View PDF
Document ID
8468328636079171813
Author
Bhavsar V
Kadlak A
Sharma S
Publication year
Publication venue
International Journal of Computer Applications

External Links

Snippet

Now a day there is a lot of data security issues. Hackers are now very much expert in using their knowledge for hack into someone else's system and grab the information. Phishing is one such type of methodologies which are used to acquire the information. Phishing is a …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bhavsar et al. Study on phishing attacks
US10084791B2 (en) Evaluating a questionable network communication
Banu et al. A comprehensive study of phishing attacks
Milletary et al. Technical trends in phishing attacks
US8095967B2 (en) Secure web site authentication using web site characteristics, secure user credentials and private browser
US12003537B2 (en) Mitigating phishing attempts
Bose et al. Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
Yadav et al. A review on recent phishing attacks in Internet
Eleyan Social engineering attacks: A phishing case simulation
Vishal et al. SOAiCE: simulation of attacks in cloud computing environment
Singh Detection of Phishing e-mail
Tundis et al. The role of Information and Communication Technology (ICT) in modern criminal organizations
Elnaim et al. The current state of phishing attacks against Saudi Arabia university students
Singh et al. A survey on phishing and anti-phishing techniques
Wojcicki Phishing attacks: preying on human psychology to beat the system and developing cybersecurity protections to reduce the risks
Szmyd et al. Online identity theft detection and prevention methods
Kumar et al. Email phishing attack mitigation using server side email addon
Singh et al. Phishing: A computer security threat
Bhati et al. Prevention approach of phishing on different websites
Pandey et al. Social engineering and exploit development
Mehendele et al. Review of Phishing Attacks and Anti Phishing Tools
Pac Phishing threats, attack vectors, and mitigation
Mihai Overview on phishing attacks
Sharma et al. A Review Of Recent Cyber-Attacks In Fiji
KR20070019896A (en) Anti-phishing techniques and programs through filtering UAL and important information
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载