Hidayat et al., 2024
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Hu et al. | {End-to-End} measurements of email spoofing attacks | |
| US10764313B1 (en) | Method and system for protection against network-based cyber threats | |
| Chaudhry et al. | Phishing attacks and defenses | |
| Ludl et al. | On the effectiveness of techniques to detect phishing sites | |
| Wu et al. | Effective defense schemes for phishing attacks on mobile computing platforms | |
| Abraham et al. | An overview of social engineering malware: Trends, tactics, and implications | |
| Bhardwaj et al. | Privacy-aware detection framework to mitigate new-age phishing attacks | |
| Dougan et al. | Man in the browser attacks | |
| US20160044054A1 (en) | Network appliance for dynamic protection from risky network activities | |
| US20060070126A1 (en) | A system and methods for blocking submission of online forms. | |
| Pande | Introduction to cyber security | |
| Athulya et al. | Towards the detection of phishing attacks | |
| Verma et al. | Cyber security: A review of cyber crimes, security challenges and measures to control | |
| Nagunwa | Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors | |
| Ahmed et al. | PhishCatcher: client-side defense against web spoofing attacks using machine learning | |
| Stivala et al. | Deceptive previews: A study of the link preview trustworthiness in social platforms | |
| Hassan et al. | Digital privacy and security using Windows: A practical guide | |
| Tzschoppe et al. | Browser-in-the-Middle-Evaluation of a modern approach to phishing | |
| Orucho et al. | Security threats affecting user-data on transit in mobile banking applications: A review | |
| Singh et al. | A survey on phishing and anti-phishing techniques | |
| Hidayat et al. | Forensic Analysis of Web Phishing and Social Engineering Using the National Institute of Standards and Technology Method Case Study of Facebook Account Data Theft | |
| Wozak et al. | End-to-end security in telemedical networks–a practical guideline | |
| Sukhram et al. | KeyStroke logs: Are strong passwords enough? | |
| Sakurai et al. | Identifying the phishing websites using the patterns of tls certificates | |
| Dhanalakshmi et al. | Detection of phishing websites and secure transactions |