[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Alghenaim et al., 2022 - Google Patents

Phishing attack types and mitigation: A survey

Alghenaim et al., 2022

View PDF
Document ID
7014078985485925717
Author
Alghenaim M
Bakar N
Abdul Rahim F
Vanduhe V
Alkawsi G
Publication year
Publication venue
The International Conference on Data Science and Emerging Technologies

External Links

Snippet

The proliferation of the internet and computing devices has drawn much attention during the Covid-19 pandemic stay home and work, and this has led the organization to adapt to staying home. Also, to let the organization work due to the infrastructure for working on proxy …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Perwej et al. A systematic literature review on the cyber security
Jain et al. Online social networks security and privacy: comprehensive review and analysis
Abraham et al. An overview of social engineering malware: Trends, tactics, and implications
Sadiq et al. A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0
Kumar et al. Network security–an updated perspective
Lazarov et al. Honey sheets: What happens to leaked google spreadsheets?
Pandey et al. A survey of cyber security trends, emerging technologies and threats
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Wadhwa et al. A Review on Cyber Crime: Major Threats and Solutions.
Dawood et al. Cyberattacks and security of cloud computing: a complete guideline
Sahoo et al. Security issues and challenges in online social networks (OSNs) based on user perspective
Alghenaim et al. Phishing attack types and mitigation: A survey
Pawlicki et al. The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Deliri et al. Security and privacy issues in social networks
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Soumya et al. Survey on threats in online social media
Biswal et al. Cyber‐crime prevention methodology
Alghenaim et al. Awareness of phishing attacks in the public sector: Review types and technical approaches
Chanti et al. A literature review on classification of phishing attacks
Aijaz et al. Security operations center—A need for an academic environment
Akpan et al. Leveraging on Cyber Security for Digital Economy: Analysis of Emerging Cyber Security Threats and Attacks
Datta Cybersecurity threats: Malware in the code
Alghenaim¹ et al. Check for
Muttoo et al. Analysing security checkpoints for an integrated utility-based information system
Sheik Abdullah et al. Big Data and Analytics