MALICIOUS LINKS AND THEIR HARMFUL EFFECTS ON INTERNET USERS

نویسندگان

چکیده

Cybercriminals have become experts in using sophisticated techniques to trick victims into sharing personal or financial information. But the best way protect ourselves remains implementation of rules that we are going recommend this article because as much seek hackers continually seeking develop malicious attacks will be difficult differentiate from real e-genuine emails and communications. Thus through study, wanted inform our readers about various constantly gaining momentum on global web with innovative growing use Internet Things (IoT) portable devices

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

leadership styles of tefl instructors at gilan university and their effects on the students attitudes and motivation

the subjects of the study are only the tefl teachers and students at gilan university. to obtain the desired data, a questionnaire which was based on the theories and disecussions gathered, was used as the main data gathering instrument. to determine the degree of relationship between variables, covariance and pearson product moment correlation coefficient were the formulas applied. the data we...

15 صفحه اول

Detecting Malicious Web Links and Identifying Their Attack Types

Malicious URLs have been widely used to mount various cyber attacks including spamming, phishing and malware. Detection of malicious URLs and identification of threat types are critical to thwart these attacks. Knowing the type of a threat enables estimation of severity of the attack and helps adopt an effective countermeasure. Existing methods typically detect malicious URLs of a single attack...

متن کامل

Predicting Malicious Users on Anonymous Chat Networks

Malicious users on chat network systems would reduce the willingness of benevolent users to chat on the same network. Thus it is often desirable to classify malicious users based on their personal profile and chat contents. In this study, different algorithms including Naive Bayes, SVM, Decision Table, Multilayer Perceptron, and Logistic classification are applied on the dataset from an anonymo...

متن کامل

turkish-israeli relations and their implication on iranian national security

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

15 صفحه اول

in translation: translators on their work and what it means

کتاب در باب ترجمه، اثر استر آلن و سوزان برنوفسکی منتشر شده در ماه می 2013 توسط نشریه کلمبیا است. نویسندگان در این کتاب به بررسی 18 مترجم با در نظر گرفتن نقش آثاری که این مترجمان ترجمه کرده اند میپردازند. کتاب به دو بخش تقسیم میشود: " مترجم در جهان" و " کار مترجم" این دو بخش مقالات همیشگی ترجمه و موقعیت خاص ادبیات بیگانه در جهان وسیع امروزی را مورد خطاب قرار میدهد. در این کتاب مقالات متعددی از ن...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of mathematics and computer research

سال: 2022

ISSN: ['2320-7167']

DOI: https://doi.org/10.47191/ijmcr/v10i11.02