Bhavsar et al., 2018 - Google Patents
Study on phishing attacksBhavsar et al., 2018
View PDF- Document ID
- 8468328636079171813
- Author
- Bhavsar V
- Kadlak A
- Sharma S
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
Now a day there is a lot of data security issues. Hackers are now very much expert in using their knowledge for hack into someone else's system and grab the information. Phishing is one such type of methodologies which are used to acquire the information. Phishing is a …
- 238000001514 detection method 0 abstract description 17
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhavsar et al. | Study on phishing attacks | |
| US10084791B2 (en) | Evaluating a questionable network communication | |
| Banu et al. | A comprehensive study of phishing attacks | |
| Milletary et al. | Technical trends in phishing attacks | |
| US8095967B2 (en) | Secure web site authentication using web site characteristics, secure user credentials and private browser | |
| US12003537B2 (en) | Mitigating phishing attempts | |
| Bose et al. | Unveiling the mask of phishing: Threats, preventive measures, and responsibilities | |
| Yadav et al. | A review on recent phishing attacks in Internet | |
| Eleyan | Social engineering attacks: A phishing case simulation | |
| Vishal et al. | SOAiCE: simulation of attacks in cloud computing environment | |
| Singh | Detection of Phishing e-mail | |
| Tundis et al. | The role of Information and Communication Technology (ICT) in modern criminal organizations | |
| Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
| Singh et al. | A survey on phishing and anti-phishing techniques | |
| Wojcicki | Phishing attacks: preying on human psychology to beat the system and developing cybersecurity protections to reduce the risks | |
| Szmyd et al. | Online identity theft detection and prevention methods | |
| Kumar et al. | Email phishing attack mitigation using server side email addon | |
| Singh et al. | Phishing: A computer security threat | |
| Bhati et al. | Prevention approach of phishing on different websites | |
| Pandey et al. | Social engineering and exploit development | |
| Mehendele et al. | Review of Phishing Attacks and Anti Phishing Tools | |
| Pac | Phishing threats, attack vectors, and mitigation | |
| Mihai | Overview on phishing attacks | |
| Sharma et al. | A Review Of Recent Cyber-Attacks In Fiji | |
| KR20070019896A (en) | Anti-phishing techniques and programs through filtering UAL and important information |