SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective.
Avisha DasShahryar BakiAyman El AassalRakesh M. VermaArthur DunbarPublished in: IEEE Commun. Surv. Tutorials (2020)
Keyphrases
- identity theft
- information security
- security requirements
- countermeasures
- network security
- security issues
- statistical databases
- malicious activities
- intrusion detection
- viewpoint
- personal information
- access control
- information assurance
- security problems
- security analysis
- security policies
- security management
- data integrity
- computer security
- key management
- security mechanisms
- phishing emails
- confidential information
- security architecture
- personal data
- functional requirements
- fraud detection
- smart card