Articles with "attack techniques" as a keyword



A survey of phishing attack techniques, defence mechanisms and open research challenges

Sign Up to like & get
recommendations!
Published in 2021 at "Enterprise Information Systems"

DOI: 10.1080/17517575.2021.1896786

Abstract: ABSTRACT Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so on. Researchers have developed various anti-phishing methods in recent years. However, the… read more here.

Keywords: survey; survey phishing; phishing attack; phishing attacks ... See more keywords

Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3153064

Abstract: File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate, avoid, and exploit these vulnerabilities over the past 35 years.… read more here.

Keywords: file based; attack techniques; toctou vulnerabilities; defense attack ... See more keywords

V2TSA: Analysis of Vulnerability to Attack Techniques Using a Semantic Approach

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3495663

Abstract: In recent years, vulnerabilities in industrial control systems have increased substantially. The operational environment’s availability constraints hinder penetration testing from the attacker’s perspective as a viable vulnerability management method, thereby limiting the ability to map… read more here.

Keywords: attack; semantic approach; vulnerability attack; attack techniques ... See more keywords