intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Phishing attack

Xem 1-9 trên 9 kết quả Phishing attack
  • Phishing attack by illegitimate URLs is of the most common security challenges for both individuals and companies in ensuring the security of their information resources. The user passwords, credit card information, or other sensitive information can be stolen by clicking on the malicious URL links.

    pdf10p videadpool 05-05-2023 7 4   Download

  • Lecture Electronic Commerce (E-Commerce) - Chapter 9: E-Commerce Security and Fraud Protection provide students with knowledge about understand the importance and scope of security of information systems for EC; describe the major concepts and terminology of EC security; learn about the major EC security threats, vulnerabilities, and technical attacks; understand Internet fraud, phishing, and spam;...

    ppt50p bachnhuocdong 23-12-2021 10 3   Download

  • Phishing is a type of Internet procedure to seek to get a victim’s credentials such as passwords, credit card numbers, bank account details and other sensitive information by defrauded webpages. Deceptive webpages have particular features to deflect victims to fall into trap. Comprehensive Phishing Detector (CPhD) system can distinguish phishing websites from legitimate websites by extracting these features from URL pattern, website content, images and animations of webpages.

    pdf10p blossom162 31-03-2019 14 2   Download

  • Phishing is a real threat on the Internet nowadays. Therefore, fighting against phishing attacks is of great importance. In this paper, we propose a solution to this problem by applying Genetic Programming with features selection methods to phishing detection problem. We conducted the experiments on a data set including both phishing and legitimate sites collected from the Internet. We compared the performance of Genetic Programming with a number of other machine learning techniques and the results showed that Genetic Programming produced the best solutions to phishing detection problem.

    pdf6p blackwidow123 15-06-2018 23 1   Download

  • (BQ) The book is divided into 2 parts, part 1 from chapter 21 to chapter 38. This part includes the contents: Mobile ad hoc network routing, security for ad hoc networks, phishing attacks and countermeasures, chaos-based secure optical communications using semiconductor lasers, chaos applications in optical communications,...and other contents.

    pdf454p tangtuy07 08-04-2016 53 4   Download

  • This second edition of Network security hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

    pdf480p trac2_123 11-04-2013 65 19   Download

  • This thesis investigates the protection landscape surrounding online banking. First, electronic banking is analysed for vulnerabilities and a survey of current attacks is carried out. This is represented graphically as an attack tree describing the different ways in which online transactions can be attacked. The discussion then moves on to various defences which have been developed, categorizing them and analyzing how successful they are at protecting against the attacks given in the first chapter.

    pdf113p bin_pham 05-02-2013 55 7   Download

  • The Symantec Global Internet Security Threat Report provides an annual overview and analysis of worldwide Internet threat activity, a review of known vulnerabilities, and highlights of malicious code. Trends in phishing and spam are also assessed, as are observed activities on underground economy servers. Previously presented every six months, this volume of the Symantec Global Internet Security Threat Report will alert readers to trends and impending threats that Symantec has observed for 2008.

    pdf110p bin_pham 05-02-2013 43 3   Download

  • Tham khảo sách 'hacking', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf50p ptng13 16-05-2012 119 22   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2