Bhardwaj et al., 2021 - Google Patents
Privacy-aware detection framework to mitigate new-age phishing attacksBhardwaj et al., 2021
- Document ID
- 16806711519334410096
- Author
- Bhardwaj A
- Al-Turjman F
- Sapra V
- Kumar M
- Stephan T
- Publication year
- Publication venue
- Computers & Electrical Engineering
External Links
Snippet
End users and imperfectly configured Internet of Things devices are the weakest links and present low-hanging targets to attack. In workplaces, online work and business are performed over insecure internet. Phishing presents privacy and safety threats to the …
- 238000001514 detection method 0 title description 33
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Privacy-aware detection framework to mitigate new-age phishing attacks | |
Jain et al. | Online social networks security and privacy: comprehensive review and analysis | |
US12231458B2 (en) | Cybersecurity risk assessment on an industry basis | |
Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
US20210377303A1 (en) | Machine learning to determine domain reputation, content classification, phishing sites, and command and control sites | |
Sadiq et al. | A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0 | |
Alani | Big data in cybersecurity: a survey of applications and future trends | |
Patil et al. | Survey on malicious web pages detection techniques | |
US20210377304A1 (en) | Machine learning to determine command and control sites | |
Bottazzi et al. | MP-shield: A framework for phishing detection in mobile devices | |
Nagunwa | Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors | |
Chanti et al. | A literature review on classification of phishing attacks | |
Gupta et al. | Exploitation of cross-site scripting (XSS) vulnerability on real world web applications and its defense | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Dimitrov | The impact of the advanced technologies over the cyber attacks surface | |
Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
Alghenaim et al. | Phishing attack types and mitigation: A survey | |
Lee et al. | Beneath the phishing scripts: A script-level analysis of phishing kits and their impact on real-world phishing websites | |
Chowdhury | Modelling cyber attacks | |
Teichmann et al. | Phishing attacks: risks and challenges for law firms | |
Mohammadi et al. | Uncovering security vulnerabilities through multiplatform malware analysis | |
Maleh | Web application PenTesting: A comprehensive Guide for professionals | |
ThreatLab | Zscaler threatlabz 2023 phishing report | |
Al Ogaili et al. | A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies | |
Goel | Detection and Prevention of Smishing Attacks |