BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods used to counteract the risks linked to BEC attacks f...
Main Authors: | Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2024-03-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/24/5/1676 |
Similar Items
-
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by: Anastasios Papathanasiou, et al.
Published: (2023-09-01) -
Business Email Compromise Phishing Detection Based on Machine Learning: A Systematic Literature Review
by: Hany F. Atlam, et al.
Published: (2022-12-01) -
A Systematic Review on Deep-Learning-Based Phishing Email Detection
by: Kutub Thakur, et al.
Published: (2023-11-01) -
WRITTEN CODE SWITCHING: THE CASE OF INDONESIAN EMAIL USERS
by: Nani Hizriani
Published: (2017-05-01) -
What Email Servers Can Tell to Johnny: An Empirical Study of Provider-to-Provider Email Security
by: Georgios Kambourakis, et al.
Published: (2020-01-01)