Arvind Prasad, Shalini Chandra,
... based attacks such as zero-width characters, homograph, punycode, homophone, bit squatting, and combosquatting attacks. The incremental ...
Tópico(s): Misinformation and Its Impacts
2023 - Elsevier BV | Computers & Security
Muhammad Uwais, Arpit Kumar Sharma, Akhil Kumar, Lakshya Veer Singh,
... ridiculing assaults which convert URL into Unicode and punycode.
Tópico(s): Spam and Phishing Detection
2020 - Blue Eyes Intelligence Engineering and Sciences Publication | International Journal of Innovative Technology and Exploring Engineering
... ridiculing assaults which convert URL into Unicode and punycode.
Tópico(s): Spam and Phishing Detection
2019 - Blue Eyes Intelligence Engineering and Sciences Publication | International Journal of Innovative Technology and Exploring Engineering
... bis. Futhermore, SMTPUTF8 mail server can encode in punycode the local part of the e-mail address. ...
Tópico(s): Power Systems and Technologies
2013 - | Journal of the Korea society of IT services
... should have overcome, but in 2003, IDNA's punycode-based scheme became a standard far IDN strings. ...
Tópico(s): Cybersecurity and Cyber Warfare Studies
2009 - | The Korean Journal of Policy Studies