Suri et al., 2012 - Google Patents
An approach to perceive tabnabbing attackSuri et al., 2012
View PDF- Document ID
- 17577624782910914240
- Author
- Suri R
- Tomar D
- Sahu D
- Publication year
- Publication venue
- Int. J. Sci. Technol. Res
External Links
Snippet
The growth of Internet has many pros and cons to mankind, which is easily visible in day to day activities. The growth of Internet has also manifested into the other domain of cyber crimes. Phishing, web defacement, money laundering, tax evasion, etc. are some of the …
- 238000001514 detection method 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Suri et al. | An approach to perceive tabnabbing attack | |
Imgraben et al. | Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users | |
Gupta et al. | Cross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense | |
Chen et al. | App isolation: get the security of multiple browsers with just one | |
Mao et al. | Defeating cross-site request forgery attacks with browser-enforced authenticity protection | |
Gupta et al. | Cross-site scripting attacks: classification, attack, and countermeasures | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Focardi et al. | Security threats and solutions for two-dimensional barcodes: a comparative study | |
Sun et al. | Model checking for the defense against cross-site scripting attacks | |
Chen et al. | Self-exfiltration: The dangers of browser-enforced information flow control | |
Shahriar et al. | Proclick: a framework for testing clickjacking attacks in web applications | |
Bauer et al. | Analyzing the dangers posed by Chrome extensions | |
Alghenaim et al. | Awareness of phishing attacks in the public sector: Review types and technical approaches | |
Chorghe et al. | A survey on anti-phishing techniques in mobile phones | |
Wedman et al. | An analytical study of web application session management mechanisms and HTTP session hijacking attacks | |
Perumal et al. | Cybercrime issues in smart cities networks and prevention using ethical hacking | |
Chughtai et al. | Deep learning trends and future perspectives of web security and vulnerabilities | |
Silva | Web 3.0 and Cybersecurity–Short Paper | |
Bulgakova et al. | Risk of information loss using jwt token | |
Amrollahi et al. | A survey on application of big data in fin tech banking security and privacy | |
Muppavaram et al. | How safe is your mobile app? mobile app attacks and defense | |
Samo et al. | An in-depth analysis of cross-site scripting (XSS): threats, mechanisms, and mitigation strategies | |
Telikicherla et al. | CORP: a browser policy to mitigate web infiltration attacks | |
Alharthi et al. | Evaluating multi-layered security approaches in cloud computing environments: Strategies and compliance | |
Ninawe et al. | Detection of DOM-based XSS attack on web application |