Alghenaim et al., 2022 - Google Patents
Phishing attack types and mitigation: A surveyAlghenaim et al., 2022
View PDF- Document ID
- 7014078985485925717
- Author
- Alghenaim M
- Bakar N
- Abdul Rahim F
- Vanduhe V
- Alkawsi G
- Publication year
- Publication venue
- The International Conference on Data Science and Emerging Technologies
External Links
Snippet
The proliferation of the internet and computing devices has drawn much attention during the Covid-19 pandemic stay home and work, and this has led the organization to adapt to staying home. Also, to let the organization work due to the infrastructure for working on proxy …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Perwej et al. | A systematic literature review on the cyber security | |
Jain et al. | Online social networks security and privacy: comprehensive review and analysis | |
Abraham et al. | An overview of social engineering malware: Trends, tactics, and implications | |
Sadiq et al. | A review of phishing attacks and countermeasures for internet of things‐based smart business applications in industry 4.0 | |
Kumar et al. | Network security–an updated perspective | |
Lazarov et al. | Honey sheets: What happens to leaked google spreadsheets? | |
Pandey et al. | A survey of cyber security trends, emerging technologies and threats | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Sahoo et al. | Security issues and challenges in online social networks (OSNs) based on user perspective | |
Wadhwa et al. | A Review on Cyber Crime: Major Threats and Solutions. | |
Alghenaim et al. | Phishing attack types and mitigation: A survey | |
Deliri et al. | Security and privacy issues in social networks | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Pawlicki et al. | The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT | |
Soumya et al. | Survey on threats in online social media | |
Biswal et al. | Cyber‐crime prevention methodology | |
Alghenaim et al. | Awareness of phishing attacks in the public sector: Review types and technical approaches | |
Aijaz et al. | Security operations center—A need for an academic environment | |
Chanti et al. | A literature review on classification of phishing attacks | |
Akpan et al. | Leveraging on Cyber Security for Digital Economy: Analysis of Emerging Cyber Security Threats and Attacks | |
Datta | Cybersecurity threats: Malware in the code | |
Akinola et al. | Introduction to Cyber-security | |
Muttoo et al. | Analysing security checkpoints for an integrated utility-based information system | |
Sheik Abdullah et al. | Big Data and Analytics | |
Teichmann et al. | Phishing attacks: risks and challenges for law firms |