Detection of Business Email Compromise Attacks with Writing Style Analysis

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:MobiSec (5. : 2021 : Jeju; Online) Mobile internet security
1. Verfasser: Vorobeva, Alisa (VerfasserIn)
Weitere Verfasser: Khisaeva, Guldar (VerfasserIn), Zakoldaev, Danil (VerfasserIn), Kotenko, Igor (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Resource-Blockchain Framework for Safeguarding IoT 2022 Bharti, Monika
Fingerprint Defender: Defense Against Browser-Based User Tracking 2022 Moad, Deepali
Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP 2022 Ji, Lejun
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces 2022 Izrailov, Konstantin
A Blockchain-Based User Identity Authentication Method for 5G 2022 Tu, Zhe
An Anonymous Communication System Based on Software Defined Architecture 2022 Cheng, Xinda
Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE Towards 6G 2022 Wang, Weilin
Security Association Model: Interdisciplinary Application of 5G Positioning Technology and Social Network 2022 Tao, Haoran
Secure LoRaWAN Root Key Update Scheme for IoT Environment 2022 Tsai, Kun-Lin
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability 2022 Gao, Yueging
Semantic Embedding-Based Entity Alignment for Cybersecurity Knowledge Graphs 2022 Kim, Minhwan
A Secure Dispersed Computing Scheme for Internet of Mobile Things 2022 Zhao, Yan
Future Applications of Blockchain in Education Sector: A Semantic Review 2022 Gharat, Paresh Sajan
A Blockchain-Based Authentication Scheme for 5G Applications 2022 Ren, Lanfang
Forensic Analysis of Fitness Applications on Android 2022 Sinha, Rahul
Trojan Attacks and Defense for Speech Recognition 2022 Zong, Wei
A Systematic Literature Review on the Mobile Malware Detection Methods 2022 Kim, Yu-kyung
Detection of Business Email Compromise Attacks with Writing Style Analysis 2022 Vorobeva, Alisa
Development of Total Security Platform to Protect Autonomous Car and Intelligent Traffic System Under 5G Environment 2022 Lee, WonHaeng
Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments 2022 Bordel, Borja
Alle Artikel auflisten