2020 3rd International Conference on Advancements in Computational Sciences (ICACS) 2020
DOI: 10.1109/icacs47775.2020.9055943
|View full text |Cite
|
Sign up to set email alerts
|

Preventive Techniques of Phishing Attacks in Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Next, click on any advertisements or pop-ups that can be avoided in the web application because they may contain malicious code. The malicious code is automatically downloaded into the system without anyone's knowledge [27]. Never utilize the input directly in the application code.…”
Section: Prevention Techniquesmentioning
confidence: 99%
“…Next, click on any advertisements or pop-ups that can be avoided in the web application because they may contain malicious code. The malicious code is automatically downloaded into the system without anyone's knowledge [27]. Never utilize the input directly in the application code.…”
Section: Prevention Techniquesmentioning
confidence: 99%
“…Phishing is a social engineering attack where attackers convince users to give their credential information through fake emails, messages, phone calls, etc. [15]. Many social media platforms, such as WhatsApp, Facebook, and Instagram, used for online business, advertisement, and marketing, become easily exploited with phishing attacks to steal users' personal information, such as usernames, passwords, and financial information.…”
Section: Phishing Attackmentioning
confidence: 99%
“…The aim is to increase the accessibility and availability of web-based solutions needed on a day-to-day basis. Nonetheless, the open accessibility and availability of these web-based solutions in cyberspace create avenues for cyber-attacks as there are no generic control measures to cyberspace [4,5]. These cyber-attacks generate critical vulnerabilities and threats for both the web-based solutions and end-users with information as well as financial losses as major aftermaths of cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%