Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
— One of TCP’s critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implem...
—The loss of UDP/IP packets has a high impact on the quality of the low-rate video streaming, since one UDP/IP packet typically represents a considerable part of a picture, which...