Amanote Research

Amanote Research

    RegisterSign In

Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat

doi 10.7287/peerj.preprints.2998v1
Full Text
Open PDF
Abstract

Available in full text

Date

June 1, 2017

Authors
Ibrahim GhafirMohammad HammoudehVaclav Prenosil
Publisher

PeerJ


Related search

Hazards and Characteristic Analysis of Phishing Emails

Computer Science and Application
2017English

Detection of Phishing Emails Using Feed Forward Neural Network

International Journal of Computer Applications
2013English

A Combined Method of Similar Code Sequences Search in Executable Files

CEUR Workshop Proceedings
Computer Science
2019English

Correction To: Better Beware: Comparing Metacognition for Phishing and Legitimate Emails

Metacognition and Learning
Education
2019English

Detection of Advanced Persistent Threat Using Machine-Learning Correlation Analysis

Future Generation Computer Systems
HardwareComputer NetworksSoftwareArchitectureCommunications
2018English

On Detecting and Mitigating Phishing Attacks Through Featureless Machine Learning Techniques

Internet Technology Letters
2019English

Institutional Barriers to Business Entry in Advanced Economies

Journal of Business Economics and Management
AccountingManagementEconomicsEconometricsBusiness
2013English

Collective Effects in SPEAR 3

1999English

Gatekeeping Prior to Point of Entry

Advances in Social Work
2004English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy