[go: up one dir, main page]

Suri et al., 2012 - Google Patents

An approach to perceive tabnabbing attack

Suri et al., 2012

View PDF
Document ID
17577624782910914240
Author
Suri R
Tomar D
Sahu D
Publication year
Publication venue
Int. J. Sci. Technol. Res

External Links

Snippet

The growth of Internet has many pros and cons to mankind, which is easily visible in day to day activities. The growth of Internet has also manifested into the other domain of cyber crimes. Phishing, web defacement, money laundering, tax evasion, etc. are some of the …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Suri et al. An approach to perceive tabnabbing attack
Imgraben et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
Gupta et al. Cross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense
Chen et al. App isolation: get the security of multiple browsers with just one
Mao et al. Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Gupta et al. Cross-site scripting attacks: classification, attack, and countermeasures
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Focardi et al. Security threats and solutions for two-dimensional barcodes: a comparative study
Sun et al. Model checking for the defense against cross-site scripting attacks
Chen et al. Self-exfiltration: The dangers of browser-enforced information flow control
Shahriar et al. Proclick: a framework for testing clickjacking attacks in web applications
Bauer et al. Analyzing the dangers posed by Chrome extensions
Alghenaim et al. Awareness of phishing attacks in the public sector: Review types and technical approaches
Chorghe et al. A survey on anti-phishing techniques in mobile phones
Wedman et al. An analytical study of web application session management mechanisms and HTTP session hijacking attacks
Perumal et al. Cybercrime issues in smart cities networks and prevention using ethical hacking
Chughtai et al. Deep learning trends and future perspectives of web security and vulnerabilities
Silva Web 3.0 and Cybersecurity–Short Paper
Bulgakova et al. Risk of information loss using jwt token
Amrollahi et al. A survey on application of big data in fin tech banking security and privacy
Muppavaram et al. How safe is your mobile app? mobile app attacks and defense
Samo et al. An in-depth analysis of cross-site scripting (XSS): threats, mechanisms, and mitigation strategies
Telikicherla et al. CORP: a browser policy to mitigate web infiltration attacks
Alharthi et al. Evaluating multi-layered security approaches in cloud computing environments: Strategies and compliance
Ninawe et al. Detection of DOM-based XSS attack on web application