Author:
Alseadoon Ibrahim,Othman M. F. I.,Chan Taizan
Publisher
Springer International Publishing
Reference35 articles.
1. Zhang, W., Luo, X., Burd, S.D., Seazzu, A.F.: How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model. In System Science (HICSS), 45th Hawaii International Conference on, 2012, pp. 2374–2380 (2012)
2. Xun, D., Clark, J.A., Jacob, J.: Modelling User-phishing Interaction. In: Proceedings of Human System Interactions May 25-27, 2008, Kraków, Poland (2008)
3. Wang, J., et al.: Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. Profess. Commun. IEEE Trans. 99, 1 (2012)
4. Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th International Conference on World Wide Web. pp. 649–656. ACM: Banff, Alberta, Canada (2007)
5. Cook, D., Gurbani, V., Daniluk, M.: Phishwish A Stateless Phishing Filter Using Minimal Rules. In: Financial Cryptography and Data Security. pp. 182–186. Springer, Heidelberg (2009)
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献