Bypassing Security Toolbars and Phishing Filters via DNS Poisoning.
Saeed Abu-NimehSuku NairPublished in: GLOBECOM (2008)
Keyphrases
- identity theft
- information security
- countermeasures
- access control
- security policies
- security issues
- security requirements
- network security
- spam filtering
- personal information
- security mechanisms
- malicious activities
- security level
- key management
- intrusion detection
- edge detection
- load balancing
- low pass filter
- information systems
- data mining