Sign Up to like & get
recommendations!
1
Published in 2021 at "Enterprise Information Systems"
DOI: 10.1080/17517575.2021.1896786
Abstract: ABSTRACT Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so on. Researchers have developed various anti-phishing methods in recent years. However, the…
read more here.
Keywords:
survey;
survey phishing;
phishing attack;
phishing attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3153064
Abstract: File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate, avoid, and exploit these vulnerabilities over the past 35 years.…
read more here.
Keywords:
file based;
attack techniques;
toctou vulnerabilities;
defense attack ... See more keywords