[go: up one dir, main page]

Weider et al., 2008 - Google Patents

A phishing vulnerability analysis of web based systems

Weider et al., 2008

Document ID
12181789227309163031
Author
Weider D
Nargundkar S
Tiruthani N
Publication year
Publication venue
2008 IEEE Symposium on Computers and Communications

External Links

Snippet

Phishing, a criminal act of collecting personal, bank and credit card information by sending out forged e-mails with fake websites, has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more and more sophisticated and are …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Weider et al. A phishing vulnerability analysis of web based systems
Alkhalil et al. Phishing attacks: A recent comprehensive study and a new anatomy
Gupta et al. Defending against phishing attacks: taxonomy of methods, current issues and future directions
McGuire et al. Cyber crime: A review of the evidence
Jahankhani et al. Cybercrime classification and characteristics
Al-Hamar et al. Enterprise Credential Spear-phishing attack detection
Huang et al. Countermeasure techniques for deceptive phishing attack
Wazid et al. A framework for detection and prevention of novel keylogger spyware attacks
Altwairqi et al. Four most famous cyber attacks for financial gains
Banday et al. Phishing-A growing threat to e-commerce
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Huang et al. Browser-side countermeasures for deceptive phishing attack
US20060179005A1 (en) Network security system and methods regarding the same
Sonowal Introduction to phishing
Paturi et al. Detection of phishing attacks using visual similarity model
Minnaar 'Crackers', cyberattacks and cybersecurity vulnerabilities: the difficulties in combatting the'new'cybercriminals
Ayub et al. Trends, patterns and consequences of cybercrime in Nigeria
Enoch et al. Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique
Chaudhary et al. Recognition of phishing attacks utilizing anomalies in phishing websites
Montazer et al. Identifying the critical indicators for phishing detection in Iranian e-banking system
Sankhwar et al. Defending Against Phishing: Case Studies.
Gan et al. Phishing: a growing challenge for Internet banking providers in Malaysia
Bhardwaj et al. Types of hacking attack and their countermeasure
Al Ogaili et al. A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies
Singh et al. Cybercrime-As-A-Service (Malware)