Login / Signup

Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat.

Ibrahim GhafirVaclav PrenosilMohammad HammoudehFrancisco J. Aparicio-NavarroKhaled M. RabieAhmad Jabban
Published in: ICFNDS (2018)
Keyphrases
  • phishing emails
  • databases
  • database
  • database systems
  • database tables
  • social networks
  • countermeasures
  • confidential information