2009
DOI: 10.1016/s1353-4858(09)70027-3
|View full text |Cite
|
Sign up to set email alerts
|

In-session phishing and knowing your enemy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…There are many techniques of phishing ranging from code-based key-logger (Goring et al, 2007), in-session phishing (Eisen, 2009), Domain Name System (DNS) poisoning, search engine phishing (Bargadiya et al, 2010) to mass emailing (Forte, 2009). Rusch (2005) discussed the various phishing techniques in comparison to real-world fishing, such as Dragnet, Rod-and-Reel, Lobsterpot and Gillnet phishing.…”
Section: Phishing Attacks Solutions and Requirementsmentioning
confidence: 99%
“…There are many techniques of phishing ranging from code-based key-logger (Goring et al, 2007), in-session phishing (Eisen, 2009), Domain Name System (DNS) poisoning, search engine phishing (Bargadiya et al, 2010) to mass emailing (Forte, 2009). Rusch (2005) discussed the various phishing techniques in comparison to real-world fishing, such as Dragnet, Rod-and-Reel, Lobsterpot and Gillnet phishing.…”
Section: Phishing Attacks Solutions and Requirementsmentioning
confidence: 99%
“…There are many techniques of phishing ranging from, code‐based key‐logger (Goring et al , 2007), in‐session phishing (Eisen, 2009), domain name system (DNS) poison, search engine phishing (Bargadiya et al , 2010) to mass e‐mailing (Forte, 2009). Rusch (2005) discussed various phishing technique in comparison to real world fishing such as dragnet, rod‐and‐reel, lobsterpot, gillnet phishing.…”
Section: Introductionmentioning
confidence: 99%