Login / Signup
Ten years of attacks on companies using visual impersonation of domain names.
Geoffrey Simpson
Tyler Moore
Richard Clayton
Published in:
eCrime (2020)
Keyphrases
</>
visual information
visual features
domain independent
visual perception
domain specific
information technology
authentication protocol
visual cues
competitive advantage
watermarking scheme
keywords
cross domain
smart card
digital images
years ago
countermeasures
low level
traffic analysis
malicious users