A literature survey on social engineering attacks: Phishing attack
暂无分享,去创建一个
Abhishek Singhal | Akanksha Kapoor | Surbhi Gupta | Surbhi Gupta | Abhishek Singhal | Akanksha Kapoor
[1] Chuanxiong Guo,et al. Online Detection and Prevention of Phishing Attacks , 2006, 2006 First International Conference on Communications and Networking in China.
[2] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[3] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[4] Hein S. Venter,et al. Social engineering attack detection model: SEADM , 2010, 2010 Information Security for South Africa.
[5] Masakatsu Nishigaki,et al. A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[6] Christian H. Sanabria,et al. Social Network Security Issues : Social Engineering and Phishing Attacks , 2012 .
[7] U. Vidya Sagar,et al. Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm , 2013 .
[8] Dhananjay Kulkarni,et al. A Steganography-based framework to prevent active attacks during user authentication , 2013, 2013 8th International Conference on Computer Science & Education.
[9] Hein S. Venter,et al. Social engineering attack framework , 2014, 2014 Information Security for South Africa.
[10] Hein S. Venter,et al. Towards an Ontological Model Defining the Social Engineering Domain , 2014, HCC.
[11] Yongchen Li,et al. An efficient image matching method using Speed Up Robust Features , 2014, 2014 IEEE International Conference on Mechatronics and Automation.
[12] Syed Taqi Ali,et al. A Computer Vision Technique to Detect Phishing Attacks , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[13] XIV , 2018, Out of the Shadow.