Author of the publication

Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups.

, , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Web Services for Location Based Services in Wireless Networks., , , , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 332-344. Springer, (2004)An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks., , , , , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 60-68. Springer, (2007)Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment., , , , and . J. Real-Time Image Processing, 14 (1): 237-244 (2018)Asia PKI Interoperability Guideline., , and . ISSE, page 309-320. Vieweg+Teubner, (2004)VoIP Secure Communication Protocol satisfying Backward Compatibility., , , and . ICSNC, page 43. IEEE Computer Society, (2007)Group Key Agreement Protocol Among Mobile Devices in Different Cells., , , , and . ISPA Workshops, volume 4331 of Lecture Notes in Computer Science, page 1090-1097. Springer, (2006)The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment., , , , , and . ICPADS (2), page 55-60. IEEE Computer Society, (2006)The SEED Encryption Algorithm., , , and . RFC, (February 2005)A PKI-Based Authentication Framework for Next Generation Mobile Internet., , , and . Human.Society@Internet 2003, volume 2713 of Lecture Notes in Computer Science, page 34-43. Springer, (2003)Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce., , and . Comput. Commun., 30 (4): 893-903 (2007)