To search, Click below search items.
All Published Papers Search Service
Title
TSPass: A Dynamic User Authentication Scheme Based On Time and Space
Author
Xuguang Ren, Xin-Wen Wu, Kun Tang
Vol. 12 No. 10 pp. 45-53
Keywords
Password, Perfect-man-in-the-middle attack, Phishing attack, Reply attack, Dynamic user authentication, Time and space dynamism
A Hybrid Model to Detect Phishing-Sites using Clustering and Bayesian Approach
Bhushan Dasharath Dhamdhere, Kaushal Sudhakar Dhonde, Rohit Gopal Chinchwade
Vol. 15 No. 1 pp. 92-95
Anti Phishing Technique, Bayesian Approach, Data Mining, Database Clustering, Hybrid Model, and Phishing Attack
Phishing Attacks on Cryptocurrency Traders in Arab States of The Gulf
Sawsan Alshehri, Reem Alhotaylah, Marwa Alyami, Abdullah Alghamdi, Mesfer Alrizq
Vol. 24 No. 8 pp. 125-134
Cryptocurrency, Ceybersecurity, Phishing Attack, Awareness, Privacy.