Weider et al., 2008 - Google Patents
A phishing vulnerability analysis of web based systemsWeider et al., 2008
- Document ID
- 12181789227309163031
- Author
- Weider D
- Nargundkar S
- Tiruthani N
- Publication year
- Publication venue
- 2008 IEEE Symposium on Computers and Communications
External Links
Snippet
Phishing, a criminal act of collecting personal, bank and credit card information by sending out forged e-mails with fake websites, has become the most popular practice among the criminals of the Web. Phishing attacks are becoming more and more sophisticated and are …
- 238000000034 method 0 abstract description 18
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Weider et al. | A phishing vulnerability analysis of web based systems | |
Alkhalil et al. | Phishing attacks: A recent comprehensive study and a new anatomy | |
Gupta et al. | Defending against phishing attacks: taxonomy of methods, current issues and future directions | |
McGuire et al. | Cyber crime: A review of the evidence | |
Jahankhani et al. | Cybercrime classification and characteristics | |
Al-Hamar et al. | Enterprise Credential Spear-phishing attack detection | |
Huang et al. | Countermeasure techniques for deceptive phishing attack | |
Wazid et al. | A framework for detection and prevention of novel keylogger spyware attacks | |
Altwairqi et al. | Four most famous cyber attacks for financial gains | |
Banday et al. | Phishing-A growing threat to e-commerce | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Huang et al. | Browser-side countermeasures for deceptive phishing attack | |
US20060179005A1 (en) | Network security system and methods regarding the same | |
Sonowal | Introduction to phishing | |
Paturi et al. | Detection of phishing attacks using visual similarity model | |
Minnaar | 'Crackers', cyberattacks and cybersecurity vulnerabilities: the difficulties in combatting the'new'cybercriminals | |
Ayub et al. | Trends, patterns and consequences of cybercrime in Nigeria | |
Enoch et al. | Mitigating Cyber Identity Fraud using Advanced Multi Anti-Phishing Technique | |
Chaudhary et al. | Recognition of phishing attacks utilizing anomalies in phishing websites | |
Montazer et al. | Identifying the critical indicators for phishing detection in Iranian e-banking system | |
Sankhwar et al. | Defending Against Phishing: Case Studies. | |
Gan et al. | Phishing: a growing challenge for Internet banking providers in Malaysia | |
Bhardwaj et al. | Types of hacking attack and their countermeasure | |
Al Ogaili et al. | A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies | |
Singh et al. | Cybercrime-As-A-Service (Malware) |