Articles with "attack techniques" as a keyword



Photo from wikipedia

A survey of phishing attack techniques, defence mechanisms and open research challenges

Sign Up to like & get
recommendations!
Published in 2021 at "Enterprise Information Systems"

DOI: 10.1080/17517575.2021.1896786

Abstract: ABSTRACT Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so on. Researchers have developed various anti-phishing methods in recent years. However, the… read more here.

Keywords: survey; survey phishing; phishing attack; phishing attacks ... See more keywords

Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3153064

Abstract: File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate, avoid, and exploit these vulnerabilities over the past 35 years.… read more here.

Keywords: file based; attack techniques; toctou vulnerabilities; defense attack ... See more keywords