A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers ...
Abstract: As QR codes become increasingly common in digital communication, cybercriminals have seized upon this technology as a vehicle for sophisticated URL-based email phishing attacks. These ...
Abstract: Face recognition (FR) is one of the most widely used biometric methods for identity authentication. Although most of the recently proposed methods demonstrate remarkable performance on ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results