Login / Signup
Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat.
Ibrahim Ghafir
Vaclav Prenosil
Mohammad Hammoudeh
Francisco J. Aparicio-Navarro
Khaled M. Rabie
Ahmad Jabban
Published in:
ICFNDS (2018)
Keyphrases
</>
phishing emails
databases
database
database systems
database tables
social networks
countermeasures
confidential information