Search alternatives:
"phishing" » "fishing", "wishing"

141
by Fleishman, Glenn
Published 2022
alt concepts
... your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who...

142
by Lakshmi, Vasantha
Published 2019
Apress
... 365 to address phishing and spam, and you will gain an understanding of how to protect your company...

143
by Sood, Aditya K.
Published 2014
Syngress
Table of Contents: ...; References; 3 Infecting the Target; 3.1 Elements Used in Incursion; 3.2 Model A: Spear Phishing Attack...

144
Published 2007
Springer US
Table of Contents: ...Network Security II -- Phishing in the Wireless: Implementation and Analysis -- Secure Path-Key...

145
Published 2020
Springer International Publishing
Table of Contents: ...-Your-Drive Insurance Models -- Microtargeting or Microphishing? Phishing Unveiled -- Privacy...

146
Published 2019
Springer International Publishing
Table of Contents: ... certificate-less key exchange protocol for IoT -- Personalized, Browser-based Visual Phishing Detection Based...

147
by Reynolds, Maxie
Published 2021
John Wiley & Sons
Table of Contents: ... -- Vulnerabilities -- AMs Applied to the Attack Vectors -- Phishing -- Mass Phish -- Spearphish -- Whaling -- Vishing...

148
Published 2023
Springer Nature Singapore
Table of Contents: ... -- Chapter 3. Detection of Phishing Website using Intelligent Machine Learning Classifiers -- Chapter 4...

149
Published 2023
Springer International Publishing
... cryptography in confidentiality, phishing, anonymity, object and user identity protection. Homomorphic...

150
by Nielson, Seth James
Published 2023
Apress
..., phishing, social media, and other email threats...

151
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... "phishing" attacks can steal your identity and how to protect against them -- How Zombies and Trojan Horses...

152
by Shipley, Todd G.
Published 2014
Syngress
... of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated...

153
Published 2021
Springer International Publishing
Table of Contents: ... identification of SMS-based phishing -- Towards a Risk Assessment Matrix for Information Security Workarounds...

154
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Authenticity Protection -- Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing...

155
Published 2019
Springer Nature Singapore
Table of Contents: ... and Pos Tags -- Chapter 7: A Multifactor Authentication Model to mitigate the Phishing Attack of e-Service...

156
Published 2019
Springer International Publishing
... and security models; data mining and knowledge discovery; phishing; security architecture and design analysis...

157
by Shipley, Todd G.
Published 2014
Syngress
... of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated...

158
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Authentication and Fraud Detection -- Phoolproof Phishing Prevention -- A Protocol for Secure...

159
Published 2024
Springer Nature Singapore
Table of Contents: ...: A Study on Combined and Individual Approaches -- Smishing: A SMS Phishing Detection Using Various...

160
Published 2018
Springer International Publishing
Table of Contents: ... Phishing -- 9 PDF-Malware Detection: A Survey and Taxonomy of Current Techniques -- 10 Adaptive Traffic...