Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11692
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSubairu, S.O-
dc.contributor.authorAlhassan, J.K-
dc.contributor.authorAbdulhamid, S.M-
dc.contributor.authorOjeniyi, J.A-
dc.date.accessioned2021-07-26T14:26:09Z-
dc.date.available2021-07-26T14:26:09Z-
dc.date.issued2020-11-24-
dc.identifier.citationS. Subairu, J. Alhassan, S. Abdulhamid and J. Ojeniyi, "A Review of Detection Methodologies for Quick Response code Phishing Attacks," 2020 2nd International Conference on Computer and Information Sciences (ICCIS), 2020, pp. 1-5, doi: 10.1109/ICCIS49240.2020.9257687.en_US
dc.identifier.otherDOI: 10.1109/ICCIS49240.2020.9257687-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/11692-
dc.description.abstractRecently, phishing attacks have taking a new dimension with the addition of quick response code to phishing attacks vectors. Quick response code phishing attack is when an attacker lures its victims to voluntarily divulge personal information such as password, personal identification number, username and other information such as online banking details through the use of quick response code. This attack is on the rise as more and more people have adopted mobile phone usage not just for communication only but to perform transaction seamlessly. The ease of creation and use of quick response code has made it easily acceptable to both provider of goods and services and consumers. This attack is semantic as it exploits human vulnerabilities; as users can hardly know what is hidden in the quick response code before usage. This study reviewed various methodologies that earlier researcher have used to detect this semantic-based attack of phishing. The strength of each methodology, its weakness and general research gaps identified.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectphishing attack , password , quick Response Code , usernameen_US
dc.titleA Review of Detection Methodologies for Quick Response code Phishing Attacksen_US
Appears in Collections:Cyber Security Science



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.