2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) 2019
DOI: 10.1109/nca.2019.8935018
|View full text |Cite
|
Sign up to set email alerts
|

Waste Flooding: A Phishing Retaliation Tool

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…This form contains a tricky link for the website, which the attacker hosts to collect the user's data. When the victim uses this link and interacts with the form by entering the required data, the data becomes under the control of the attacker [33] as clarified in Fig. 2.…”
Section: The Ecosystem Of Phishing Attack Processmentioning
confidence: 99%
See 1 more Smart Citation
“…This form contains a tricky link for the website, which the attacker hosts to collect the user's data. When the victim uses this link and interacts with the form by entering the required data, the data becomes under the control of the attacker [33] as clarified in Fig. 2.…”
Section: The Ecosystem Of Phishing Attack Processmentioning
confidence: 99%
“…The preventive technique introduced by Well-Built authentication. A corrective technique introduced by like site removal [33].…”
Section: Phishing Attacks Typesmentioning
confidence: 99%
“…It is common among other security threats, use as the initial step to gain access to an electronic device for further exploitation without the user awareness. Phishers deceive people and obtain secret information [1], such as usernames, passwords, credit card numbers, and IDs from a victim [36]. It targets the human element of cyber-securitywhich [37]account for 95% of cyber incidents and is used as the initial stages usedin cyber-security breaches [38], [21], [39].According to the UK Cyber-security and Strategy 2016-2021 and world statistics, almost all the successful cyber-attacks have a contributing human influence [40] which is to say that cyber-security is not just about the technology as human knowledge on security is also required for cyber-security stability.…”
Section: Introductionmentioning
confidence: 99%