Sorry, we do not have enough data to show an influence graph for this author.
- Full text PDF available (1)
Journals and Conferences
Till now, the best defense against phishing is the use of two-factor authentication systems. Yet this protection is short-lived and comparatively weak. The absence of a foolproof solution against Man-in-the-Middle, or Active Phishing, attacks have resulted in an avalanche of security practitioners painting bleak scenarios where Active Phishing attacks… (More)