2012 IEEE International Conference on Information and Automation 2012
DOI: 10.1109/icinfa.2012.6246756
|View full text |Cite
|
Sign up to set email alerts
|

Anatomy of compromising email accounts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Compromised accounts initially became the object of research interest in e-mail and web services as seen in [22,12]. In a similar scenario to OSNs, users credentials are stolen using malicious link or phishing techniques [14,22].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Compromised accounts initially became the object of research interest in e-mail and web services as seen in [22,12]. In a similar scenario to OSNs, users credentials are stolen using malicious link or phishing techniques [14,22].…”
Section: Related Workmentioning
confidence: 99%
“…In a similar scenario to OSNs, users credentials are stolen using malicious link or phishing techniques [14,22]. Concerning e-mails, researches already conducted work in user levels by using social engineering to emphasize user awareness [12], while another different approach combined network information, machine learning and content analysis in order to detect harmful content [22].…”
Section: Related Workmentioning
confidence: 99%