Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Emilin Shyni"'
Publikováno v:
Ecology, Environment and Conservation. :S405-S410
The very first infected novel coronavirus case (COVID-19) was found in Hubei, China in Dec.2019. TheCOVID-19 pandemic has spread over 214 countries and areas in the world, and has significantly affectedevery aspect of our daily lives. At the time of
Publikováno v:
2022 6th International Conference on Electronics, Communication and Aerospace Technology.
Autor:
C. Emilin Shyni, V. Roopa
Publikováno v:
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE).
The technological advancements in IT has made agriculture industry move towards a sustainable growth. Farming may not sound like an issue we need to care about, but the agriculture industry is in dire need of refinement. Sustaining in agriculture is
Publikováno v:
Circuits and Systems. :2507-2520
Phishing is the act of attempting to steal a user’s financial and personal information, such as credit card numbers and passwords by pretending to be a trustworthy participant, during online communication. Attackers may direct the users to a fake w
Publikováno v:
2018 Recent Advances on Engineering, Technology and Computational Sciences (RAETCS).
Phishing is a technique of tricking people into giving sensitive information like usernames and passwords, credit card details, sensitive bank information, etc., by way of email spoofing, instant messaging, or using fake web sites whose look and feel
Publikováno v:
International Journal of Computer Applications. 89:38-41
recent years, we have witnessed a dramatic raise in the use of web and thus email becomes an inevitable mode of communication. This is the scenario where the attackers take advantage by the mode of spam mails to the email users and misguide them to s
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
S. Swamynathan, C. Emilin Shyni
Publikováno v:
Journal of Computer Science. 9:526-533
A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other
Autor:
Emilin Shyni. C, S. Swamynathan
Publikováno v:
International Journal of Computer Theory and Engineering. :32-37
Publikováno v:
High Performance Architecture and Grid Computing ISBN: 9783642225765
HPAGC
HPAGC
Security remains a major threat to the entire Web for many kinds of transactions. Most of the threats are created through application level vulnerabilities and have been exploited with serious consequences. Among the various types of application leve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::962c734844f82d81062b22c22fbe69a0
https://doi.org/10.1007/978-3-642-22577-2_45
https://doi.org/10.1007/978-3-642-22577-2_45