Author:
Gupta Deepak,Gandotra Ekta,Mohan Yogesh,Singh Sukhvir
Publisher
Springer International Publishing
Reference44 articles.
1. Peng P, Xu C, Quinn L, Hu H, Viswanath B, Wang G (2019) What happens after you leak your password: Understanding credential sharing on phishing sites. In: Proceedings of the 2019 ACM Asia conference on computer and communications security, pp 181–192
2. Threat Analysis Group, Findings on COVID-19 and online security threats. Available online at: https://blog.google/technology/safety-security/threat-analysis-group/findings-covid-19-and-online-security-threats/
3. Phishing Activity Trends Report, APWG (2021) Available online at: https://docs.apwg.org/reports/apwg_trends_report_q2_2021.pdf
4. Security. Available online at: https://www.securitymagazine.com/articles/96430-mobile-phishing-threats-surged-161-in-2021
5. Gupta D, Rani R (2019) A study of big data evolution and research challenges. J Inf Sci 45:322–340
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Identification of Phishing Attacks using Machine Learning;2023 Seventh International Conference on Image Information Processing (ICIIP);2023-11-22