Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography
暂无分享,去创建一个
Amit Kumar | Navreet Kaur | Manraj Singh | Shubham Chuchra | Sajan Dhawan | Amit Kumar | Navreet Kaur | S. Dhawan | Manraj Singh | Shubham Chuchra
[1] Christopher Krügel,et al. Protecting users against phishing attacks with AntiPhish , 2005, 29th Annual International Computer Software and Applications Conference (COMPSAC'05).
[2] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[3] Chase Qishi Wu,et al. An integrated cyber security monitoring system using correlation-based techniques , 2009, 2009 IEEE International Conference on System of Systems Engineering (SoSE).
[4] Shujun Li,et al. A novel anti-phishing framework based on honeypots , 2009, 2009 eCrime Researchers Summit.
[5] Ion Lungu,et al. Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions , 2010 .
[6] Joseph Paul Cohen,et al. Challenge Based Learning in Cybersecurity Education , 2011 .
[7] Brian M. Bowen,et al. Measuring the human factor of cyber security , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[8] Tudor Dumitras,et al. Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware , 2011, CSET.
[9] Terry V. Benzel. The science of cyber security experimentation: the DETER project , 2011, ACSAC '11.
[10] Yang Xin,et al. An Empirical Analysis of the Effectiveness of Browser-based Antiphishing Solutions , 2012 .
[11] A. Diop. Journal of Theoretical and Applied Information Technology , 2012 .
[12] Shari Lawrence Pfleeger,et al. Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..
[13] U. Vidya Sagar,et al. Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm , 2013 .
[14] Vinod Kumar Sharma,et al. Multiphase Encryption: A New Concept in Modern Cryptography , 2013 .
[15] Ali Selamat,et al. A survey on malware propagation, analysis, and detection , 2013 .
[16] Mounika Reddy,et al. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY , 2013 .
[17] Rimmy Chuchra,et al. Use of web Mining in Network Security , 2013 .
[18] David Whyte,et al. Securing Canada's Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research , 2013 .
[19] G. Nikhita Reddy,et al. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies , 2014, ArXiv.
[20] Eduard H. Hovy,et al. A taxonomy and a knowledge portal for cybersecurity , 2014, DG.O.
[21] Rossouw von Solms,et al. A conceptual framework for cyber-security awareness and education in SA , 2014, South Afr. Comput. J..
[22] Piyush Bhatia,et al. Type of Security Threats and its Prevention , 2014 .
[23] Raghav Gupta,et al. A Review of Cyber Security Techniques for Critical Infrastructure Protection , 2014 .
[24] Rita Tehan. Cybersecurity: Authoritative Reports and Resources, by Topic , 2014 .
[25] Ali Selamat,et al. Current state of anti-phishing approaches and revealing competencies , 2014 .
[26] Rajendra Gupta,et al. System Design, Investigation and Countermeasure of Phishing Attacks using Data Mining Classification Methods and its Analysis , 2015 .
[27] Tobby Simon,et al. The Impact of the Dark Web on Internet Governance and Cyber Security , 2015 .
[28] Shubham Chuchra,et al. Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA) , 2015 .