Limpar
5 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Revisado por pares

Arvind Prasad, Shalini Chandra,

... based attacks such as zero-width characters, homograph, punycode, homophone, bit squatting, and combosquatting attacks. The incremental ...

Tópico(s): Misinformation and Its Impacts

2023 - Elsevier BV | Computers & Security

Artigo Acesso aberto

Muhammad Uwais, Arpit Kumar Sharma, Akhil Kumar, Lakshya Veer Singh,

... ridiculing assaults which convert URL into Unicode and punycode.

Tópico(s): Spam and Phishing Detection

2020 - Blue Eyes Intelligence Engineering and Sciences Publication | International Journal of Innovative Technology and Exploring Engineering

Artigo Acesso aberto

... ridiculing assaults which convert URL into Unicode and punycode.

Tópico(s): Spam and Phishing Detection

2019 - Blue Eyes Intelligence Engineering and Sciences Publication | International Journal of Innovative Technology and Exploring Engineering

Artigo Acesso aberto

Dong-Yun Han, Kyongsok Kim,

... bis. Futhermore, SMTPUTF8 mail server can encode in punycode the local part of the e-mail address. ...

Tópico(s): Power Systems and Technologies

2013 - | Journal of the Korea society of IT services

Artigo Revisado por pares

Hwi Chun Eung,

... should have overcome, but in 2003, IDNA's punycode-based scheme became a standard far IDN strings. ...

Tópico(s): Cybersecurity and Cyber Warfare Studies

2009 - | The Korean Journal of Policy Studies