Panorios, 2024 - Google Patents
Phishing attacks detection and preventionPanorios, 2024
View PDF- Document ID
- 17628048378403289656
- Author
- Panorios M
- Publication year
External Links
Snippet
Η ακόλουθη διπλωματική εργασία αποτελεί το τελευταίο σκέλος των μεταπτυχιακών σπουδών στα πλαίσια του προγράμματος «Ασφάλεια Ψηφιακών Συστημάτων» του τμήματος «Ψηφιακών Συστημάτων» του Πανεπιστημιου Πειραιώς. Το θέμα που επιλέχθηκε για την …
- 238000001514 detection method 0 title description 74
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12316591B2 (en) | Multi-level security analysis and intermediate delivery of an electronic message | |
US11722513B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
US11323464B2 (en) | Artifact modification and associated abuse detection | |
US11044267B2 (en) | Using a measure of influence of sender in determining a security risk associated with an electronic message | |
US11102244B1 (en) | Automated intelligence gathering | |
US10805314B2 (en) | Using message context to evaluate security of requested data | |
US20210058395A1 (en) | Protection against phishing of two-factor authentication credentials | |
Lazarov et al. | Honey sheets: What happens to leaked google spreadsheets? | |
US12069021B2 (en) | Email sender and reply-to authentication to prevent interception of email replies | |
Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
Haber et al. | Attack vectors | |
Yadav et al. | A review on recent phishing attacks in Internet | |
Neumeier et al. | Social engineering, imperfect human | |
El Aassal et al. | Spears Against Shields: Are Defenders Winning the Phishing War? | |
Kanj et al. | A Review of Tactics, Techniques, and Procedures (TTPs) of MITRE Framework for Business Email Compromise (BEC) Attacks | |
JP7641410B2 (en) | Email security system for blocking and responding to targeted email attacks that inspect for unauthorized email server access attacks and method of operation thereof | |
WO2018081016A1 (en) | Multi-level security analysis and intermediate delivery of an electronic message | |
Särökaari | Phishing attacks and mitigation tactics | |
Kim et al. | Fundamentals of information systems security: Print bundle | |
Panorios | Phishing attacks detection and prevention | |
Jang et al. | An Analysis of Phishing Cases Using Text Mining | |
Yahia | Effective Threat Investigation for SOC Analysts | |
Patayo | A Preventive and Detective Model for Phishing Attack in Small and Medium Size Businesses | |
Gunawardana | An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments | |
Weiss | CompTIA Security+ SY0-601 Exam Cram |