Author:
Corona Igino,Biggio Battista,Contini Matteo,Piras Luca,Corda Roberto,Mereu Mauro,Mureddu Guido,Ariu Davide,Roli Fabio
Publisher
Springer International Publishing
Reference42 articles.
1. Beardsley, T.: Phishing detection and prevention, practical counter-fraud solutions. Technical report, TippingPoint (2005)
2. Hong, J.: The state of phishing attacks. Commun. ACM 55(1), 74–81 (2012)
3. Khonji, M., Iraqi, Y., Jones, A.: Phishing detection: a literature survey. Commun. Surv. Tutorials 15(4), 2091–2121 (2013). IEEE
4. Han, X., Kheir, N., Balzarotti, D.: Phisheye: live monitoring of sandboxed phishing kits. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 1402–1413. ACM, New York (2016)
5. Bursztein, E., Benko, B., Margolis, D., Pietraszek, T., Archer, A., Aquino, A., Pitsillidis, A., Savage, S.: Handcrafted fraud and extortion: manual account hijacking in the wild. In: IMC 2014, pp. 347–358 (2014)
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献