Computer Science ›› 2006, Vol. 33 ›› Issue (3): 99-100.

Previous Articles     Next Articles

ZHANG Bo,  LI Wei-Hua (College of Computer Science, Northwestern Polytechnical University, Xi'an 710072)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: The phishing hazard becomes more and more terribly, This paper introduces and analyzes the phishing attack behaviors. It adopts the methods of building the attack forest and sorting the attack behaviours and then constitutes the attack model. We present t

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!