Search alternatives:
"phishing" » "fishing", "wishing"

201
by Glenn, Walter J.
Published 2008
Microsoft Press
..., and phishing. Written by expert authors Walter Glenn and Scott Lowe, this reference delivers comprehensive...

202
by Viega, John
Published 2009
O'Reilly Media
Table of Contents: ... of phish in the sea --; The cult of Schneier --; Helping others stay safe on the Internet --; Snake oil...

203
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing...

204
Published 2019
Springer International Publishing
Table of Contents: ... -- Mouse Behavior as an Index of Phishing Awareness -- Perceptions of risk, benefits and likelihood...

205
Published 2022
Springer Nature Singapore
Table of Contents: ... Systems -- Phishing Fraud Detection on Ethereum Using Graph Neural Network...

206
by Whitaker, Andrew
Published 2009
Addison-Wesley

207
by Vigo, Jesus
Published 2023
Apress L. P.
... in the wild, such as malware and phishing...

208
Published 2022
Springer International Publishing
Table of Contents: ... with innovation and creativity as enablers -- Understanding phishing in mobile instant messaging: A study...

209
by Wells, Joseph T.
Published 2010
John Wiley & Sons
.... Topics included are phishing, on-line auction fraud, security breaches, counterfeiting, and others...

210
by Weisman, Steve
Published 2008
FT Press
... · The truth about safeguarding your money, health, and reputation · The truth about phishing, vishing...

211
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...’ Controversial Reward Scheme -- Proactive Discovery of Phishing Related Domain Names -- Evaluating Electricity...

213
Published 2019
Springer International Publishing
Table of Contents: ...Generating Phishing Emails Using Graph Database.-Short Paper II -- Evaluating Intrusion Sensitivity...

214
Published 2019
Springer International Publishing
Table of Contents: ... and Survey on Smartphones: The Closest Enemy to Privacy -- Hybrid rule-based model for phishing URLs...

215
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... for Mobile Robot -- In-depth Evaluation of Content-Based Phishing Detection to Clarify Its Strengths...

216
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... and Countermeasures in WLAN -- Securing OLSR Routes -- SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks...

217
Published 2023
Springer Nature Switzerland
Table of Contents: ... Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness...

218
Published 2024
Springer Nature Singapore
Table of Contents: ... -- Machine Learning and Data Analysis -- Spear-phishing Detection Method Based on Few-shot Learning -- Time...

219
Published 2024
Springer International Publishing
... case study about an automated process for analyzing cyber frauds specifically in phishing and cloning...

220
Published 2024
Springer Nature Switzerland
Table of Contents: ...-constrained Networks and Cybersecurity -- A Gamification Architecture to Enhance Phishing Awareness...