Using URL shorteners to compare phishing and malware attacks.
Sophie Le PageGuy-Vincent JourdanGregor von BochmannJason FloodIosif-Viorel OnutPublished in: eCrime (2018)
Keyphrases
- countermeasures
- phishing attacks
- identity theft
- detect malicious
- malicious code
- web pages
- website
- reverse engineering
- watermarking scheme
- keywords
- phishing emails
- software engineering
- static analysis
- computer security
- control flow
- malware detection
- attack detection
- malicious users
- malicious activities
- information systems