Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...
Saved in:
| Main Author: | Benavides , Eduardo (author) |
|---|---|
| Other Authors: | Fuertes, Walter (author), Sanchez , Sandra (author), Nuñez-Agurto, Daniel (author) |
| Format: | article |
| Language: | spa |
| Published: |
2020
|
| Subjects: | |
| Online Access: | https://revistas.uteq.edu.ec/index.php/cyt/article/view/357 |
| Tags: |
No Tags, Be the first to tag this record!
|
Similar Items
-
Zero-day attacks detection using machine learning techniques
by: Armijos Inga, Arianna Belen
Published: (2023) -
Desarrollo de una aplicación para detección de patrones en imágenes mediante el uso de aprendizaje profundo
by: Jácome Escobar, José David
Published: (2019) -
Aplicación de técnicas de word embedding para detectar emociones en texto en idioma español usando algoritmos de machine learning y deep learning.
by: González Mora, Mayerli Anahi
Published: (2025) -
Inteligencia artificial como herramienta determinante para la obtención de prestaciones del derecho de alimentos
by: Sanchez Pintado, Roberth Adrián
Published: (2023) -
Detección en tiempo real de phishing por email mediante técnicas de procesamiento de lenguaje natural y algoritmos de clasificación para una empresa corporativa
by: Samaniego Palacios, Carlos Patricio
Published: (2022)