Author:
Soni Jayesh,Sirigineedi Surya,Vutukuru Krishna Sai,Sirigineedi S. S. ChandanaEswari,Prabakar Nagarajan,Upadhyay Himanshu
Publisher
Springer International Publishing
Reference37 articles.
1. Joint Task Force Transformation Initiative, Guide for conducting risk assessments, National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800–30r1 (2012)
2. What is Cybersecurity? | IBM. https://www.ibm.com/topics/cybersecurity. Accessed 26 Jan 2022
3. Cost of a Data Breach Report 2021, Risk Quantif., p. 73
4. S.S. Sirigineedi, J. Soni, H. Upadhyay, Learning-based models to detect runtime phishing activities using urls. In Proceedings of the 2020 the 4th International Conference on Compute and Data Analysis (2020), pp. 102–106
5. J. Kang, D. Lee, Advanced white list approach for preventing access to phishing sites, in 2007 International Conference on Convergence Information Technology (ICCIT 2007) (IEEE, 2007), pp. 491–496