Andrushchak I.Ye. Features of the main directions, techniques and methods of protection against fishing at-tacks
Abstract
This article discusses common modern heuristic technologies used in anti-phishing tools and protection methods. An overview of different types of mobile phishing attacks is given, as well as the main methods of detecting and reducing the level of fishing attacks.
References
Bay H., Ess A., and Tuytelaars T. SURF: Speeded Up Robust Features // Computer Vision and Image Understanding (CVIU). 2008. V. 110. No. 3. P. 346–359.
Devyanin P. N. Security models of computer systems. Access and information flow management. Proc. allowance for universities. M.: Hotline-Telecom, 2011.
Lininger R. and Vines D. Phishing: Cutting the Identity Theft Line. Wiley, 2005. 334 p.
Mobile Phishing Attacks and Mitigation Techniques. [Electronic resource] // Journal of Information Security. URL: http://www.scirp.org/journal/jis/
Patil R., Dhamdhere B.D., Dhonde K.S., Chinchwade R.G., Mehetre S.B. A hybrid model to detect phishing sites using clustering and bayesian approach // IEEE International Conference for Convergence of Technology (I2CT), 2014.
Sandhu R., Coyne E. J., Feinstein H. L., and Youman C. E. Role-Based Access Control Models // IEEE Computer (IEEE Press). 1996. V. 29. No. 2. P. 38-47.
Abstract views: 126 PDF Downloads: 111