共 44 条
[1]
Al Kabir M.A., Adaptive risk-based passwordless authentication: a Fido2 integrated approach for enhanced security and usability
[2]
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
[J].
FUTURE INTERNET,
2020, 12 (10)
:1-39
[3]
Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods
[J].
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016),
2016,
:289-301
[4]
Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
[J].
FRONTIERS IN COMPUTER SCIENCE,
2021, 3
[6]
Andriamilanto N, 2021, ADV INTELL SYST COMP, V1195, P161, DOI 10.1007/978-3-030-50399-4_16
[7]
BrFAST: a Tool to Select Browser Fingerprinting Attributes for Web Authentication According to a Usability-Security Trade-off
[J].
WEB CONFERENCE 2021: COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2021),
2021,
:701-704
[8]
FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms
[J].
36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020),
2020,
:627-642
[9]
Bazm MM, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P7, DOI 10.1109/FMEC.2018.8364038
[10]
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild
[J].
PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14),
2014,
:347-358