Saxena, 2017 - Google Patents
Web Spamming-A ThreatSaxena, 2017
- Document ID
- 18047877525784535242
- Author
- Saxena M
- Publication year
External Links
Snippet
Well, there are thousands of books on Web Spamming already flooding the market and libraries. The reader may naturally wonder about the need of writing another book on this topic. This book is based on my research report which I have written to get Masters Degree …
- 238000000034 method 0 abstract description 49
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323464B2 (en) | Artifact modification and associated abuse detection | |
US11102244B1 (en) | Automated intelligence gathering | |
US20240089285A1 (en) | Automated responsive message to determine a security risk of a message sender | |
US11546371B2 (en) | System and method for determining actions to counter a cyber attack on computing devices based on attack vectors | |
US20210058395A1 (en) | Protection against phishing of two-factor authentication credentials | |
US10805314B2 (en) | Using message context to evaluate security of requested data | |
James | Phishing exposed | |
US10326779B2 (en) | Reputation-based threat protection | |
Goenka et al. | A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy | |
US20180152471A1 (en) | Detecting computer security risk based on previously observed communications | |
Newman | Computer Security: Protecting Digital Resources: Protecting Digital Resources | |
US11392691B1 (en) | System and method of securing e-mail against phishing and ransomware attack | |
Gattiker | The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology | |
Haber et al. | Attack vectors | |
Tundis et al. | The role of Information and Communication Technology (ICT) in modern criminal organizations | |
Seth et al. | A comprehensive study of classification of phishing attacks with its AI/I detection | |
Yahia | Effective Threat Investigation for SOC Analysts | |
Dhinakaran et al. | Multilayer approach to defend phishing attacks | |
Saxena | Web Spamming-A Threat | |
Al Ogaili et al. | A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies | |
Panorios | Phishing attacks detection and prevention | |
Siadati | Prevention, detection, and reaction to cyber impersonation attacks | |
Althobaiti et al. | A review of organization-oriented phishing research | |
Akinola et al. | Introduction to Cyber-security | |
Reuvid | The Secure Online Business Handbook: e-commerce, IT functionality & business continuity |