Phishing attacks digital trace analysis for security awareness
The presented work contains recommendations for collecting a digital trail of phishing attacks. Some examples of algorithms for collecting a digital trace, studied indicators, and collected data are considered. The features of working with a digital trace are given. The authors also provide a set of...
Збережено в:
Автори: | , |
---|---|
Формат: | Статья |
Мова: | English |
Опубліковано: |
CEUR-WS
2022
|
Предмети: | |
Онлайн доступ: | https://dspace.ncfu.ru/handle/20.500.12258/19385 |
Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|