Sciweavers

6 search results - page 2 / 2
» Establishment of Ad-Hoc Communities through Policy-Based Cry...
Sort
View
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 1 days ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton