Author:
Canova Gamze,Volkamer Melanie,Bergmann Clemens,Borza Roland
Publisher
Springer International Publishing
Reference9 articles.
1. Ramzan, Z.: Phishing attacks and countermeasures. In: Handbook of Information and Communication Security, pp. 433–448. Springer, Heidelberg (2010)
2. Aaron, G., Rasmussen, R., Routt, A.: Global phishing survey: Trends and domain name use in 2h2013. Anti-Phishing Working Group (2014)
3. Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In: SOUPS, pp. 88–99. ACM (2007)
4. Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: SIGCHI. ACM (2006)
5. Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: SIGCHI, pp. 2075–2084. ACM (2011)
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献