Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Website spoofing

Known as: WEB spoofing, Microsoft Firefox 2007, Site spoofs 
Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Phishing is a security threat which combines social engineering and website spoofing techniques to deceive users into revealing… Expand
2011
2011
DNSSEC can provide a strong countermeasure to DNS Cache Poisoning Attacks, however, DNSSEC can't be actually deployed in a short… Expand
  • figure 1.1
  • table 1
  • figure 3.3
  • figure 3.3
  • figure 3.3
Highly Cited
2007
Highly Cited
2007
Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Highly Cited
2007
Highly Cited
2007
Phishing is a current social engineering attack that results in online identity theft. In a phishing attack, the attacker… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Highly Cited
2006
Highly Cited
2006
Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Highly Cited
2005
Highly Cited
2005
Computer security protocols usually terminate in a computer; however, the human-based services which they support usually… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2004
Highly Cited
2004
Web spoofing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing… Expand
  • figure 1
  • figure 2
  • figure 4
2004
2004
In spite of the use of standard web security measures, swindlers often clone sensitive web sites and/or present false credentials… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2002
2002
Often, the main motivation for using PKI in business environments is to streamline workflow, by enabling humans to digitally sign… Expand
  • figure 1
  • table 1
Highly Cited
1997
Highly Cited
1997
Web spoofing allows an attacker to create a “shadow copy” of the entire World Wide Web. Accesses to the shadow Web are funneled… Expand
  • figure 1