Downloads provided by UsageCounts
Abstract— Phishing is a cyber-attack that involves posing as a trustworthy source and obtaining confidential or private data. Phishers also take advantage of users' interest in a site's appearance by using web pages that appear to be authentic. Data acquired could be then used for fraudulent activities. This paper looks phishing in detail, the working or mechanism, the various types, and how to prevent from the attack.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 3 | |
| downloads | 2 |

Views provided by UsageCounts
Downloads provided by UsageCounts