2021
DOI: 10.1016/j.compeleceng.2021.107363
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise Credential Spear-phishing attack detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 33 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…e technique will become more complex as a result, and more capital will be required. In addition, intrusion detection can be time and expense-consuming due to the many protocols involved [7]. Vigneswaran et al [8] developed an anomalybased IDS that functions in traditional networks and trains and tests the model using the KDDCup99 dataset.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…e technique will become more complex as a result, and more capital will be required. In addition, intrusion detection can be time and expense-consuming due to the many protocols involved [7]. Vigneswaran et al [8] developed an anomalybased IDS that functions in traditional networks and trains and tests the model using the KDDCup99 dataset.…”
Section: Related Workmentioning
confidence: 99%
“…It can only receive raw packets from the host router node, which contain con dential data. For genuine time-destroying behavior in domestic IoT gadgets, Anthi et al [7] proposed three-layer IDS architecture. e protection layers in this architecture de ne intrusion for IoT systems based on their normal or irregular behavior.…”
Section: Related Workmentioning
confidence: 99%
“…2019 Phishing Attacks Solution An anti-phishing 􀅫ilter should be applied to prevent access to vulnerable websites, even if the user accidentally clicks on an unknown URL [42].…”
Section: ) Phishing Attacksmentioning
confidence: 99%
“…Several technologies such as IDS, firewalls, and traffic shaping devices are available to secure a network. In addition, numerous attack modelling approaches are available to help organizations understand the nature of an assault [3][4][5]. One of the top concerns for businesses is to protect their networks from the external attacks.…”
Section: Introductionmentioning
confidence: 99%