Lee et al., 2020 - Google Patents
Phishing and Financial ManipulationLee et al., 2020
- Document ID
- 339910730666810958
- Author
- Lee B
- Paek S
- Publication year
- Publication venue
- The Palgrave Handbook of International Cybercrime and Cyberdeviance
External Links
- 230000000116 mitigating 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hutchings et al. | The online stolen data market: disruption and intervention approaches | |
Omodunbi et al. | Cybercrimes in Nigeria: Analysis, detection and prevention | |
Ali et al. | Phishing—A cyber fraud: The types, implications and governance | |
Aburrous et al. | Experimental case studies for investigating e-banking phishing techniques and attack strategies | |
Cagnazzo et al. | GDPiRated–stealing personal information on-and offline | |
Trautman et al. | Posted: No Phishing | |
Blanco Hache et al. | ’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: 1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Butler | A framework of anti‐phishing measures aimed at protecting the online consumer's identity | |
Hutchings et al. | Displacing big data: How criminals cheat the system | |
Hummer et al. | Identity theft and financial loss | |
Okocha et al. | Online social networks misuse, cyber-crimes and counter-mechanisms in Nigeria | |
Ama et al. | Cybersecurity Challenge in Nigeria Deposit Money Banks | |
ISER et al. | Role of awareness to prevent personal disasters: reducing the risks of falling for phishing by strengthening user awareness | |
Greer | The growth of cybercrime in the United States | |
Sankhwar et al. | Cybercrime in India: an analysis of crime against women in ever expanding digital space | |
Lee et al. | Phishing and Financial Manipulation | |
Khan | Implication of cyber warfare on the financial sector. An exploratory study | |
Dam | Relationship Between Demographic Variables and Awareness on Cybersecurity Threats: An Empirical Analysis | |
Aneke et al. | Towards determining cybercrime technology evolution in Nigeria | |
Medlin et al. | The cost of electronic retailing: Prevalent security threats and their results | |
Lee et al. | Phishing and Financial Manipulation | |
Ayyagari | Data breaches and carding | |
Balabantaray | Examining the Impact of Cyber Fraud on Indian Society: An Assessment of the Potential Damage | |
AlMajed et al. | Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities |