[go: up one dir, main page]

Panorios, 2024 - Google Patents

Phishing attacks detection and prevention

Panorios, 2024

View PDF
Document ID
17628048378403289656
Author
Panorios M
Publication year

External Links

Snippet

Η ακόλουθη διπλωματική εργασία αποτελεί το τελευταίο σκέλος των μεταπτυχιακών σπουδών στα πλαίσια του προγράμματος «Ασφάλεια Ψηφιακών Συστημάτων» του τμήματος «Ψηφιακών Συστημάτων» του Πανεπιστημιου Πειραιώς. Το θέμα που επιλέχθηκε για την …
Continue reading at dione.lib.unipi.gr (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US12316591B2 (en) Multi-level security analysis and intermediate delivery of an electronic message
US11722513B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US11323464B2 (en) Artifact modification and associated abuse detection
US11044267B2 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US11102244B1 (en) Automated intelligence gathering
US10805314B2 (en) Using message context to evaluate security of requested data
US20210058395A1 (en) Protection against phishing of two-factor authentication credentials
Lazarov et al. Honey sheets: What happens to leaked google spreadsheets?
US12069021B2 (en) Email sender and reply-to authentication to prevent interception of email replies
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Haber et al. Attack vectors
Yadav et al. A review on recent phishing attacks in Internet
Neumeier et al. Social engineering, imperfect human
El Aassal et al. Spears Against Shields: Are Defenders Winning the Phishing War?
Kanj et al. A Review of Tactics, Techniques, and Procedures (TTPs) of MITRE Framework for Business Email Compromise (BEC) Attacks
JP7641410B2 (en) Email security system for blocking and responding to targeted email attacks that inspect for unauthorized email server access attacks and method of operation thereof
WO2018081016A1 (en) Multi-level security analysis and intermediate delivery of an electronic message
Särökaari Phishing attacks and mitigation tactics
Kim et al. Fundamentals of information systems security: Print bundle
Panorios Phishing attacks detection and prevention
Jang et al. An Analysis of Phishing Cases Using Text Mining
Yahia Effective Threat Investigation for SOC Analysts
Patayo A Preventive and Detective Model for Phishing Attack in Small and Medium Size Businesses
Gunawardana An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
Weiss CompTIA Security+ SY0-601 Exam Cram