Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference63 articles.
1. Webroot. Quarterly threat trends: Phishing attacks growing in scale and sophistication; 2017. Accessed 14 Nov 2017. https://s3-us-west-1.amazonaws.com/webroot-cms-cdn/8415/0585/3084/Webroot_Quarterly_Threat_Trends_September_2017.pdf.
2. Chiew, K. L., Yong, K. S. C., & Tan, C. L. (2018). A survey of phishing attacks: their types, vectors and technical approaches. Expert Systems with Applications, 106, 1–20.
3. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., & Weiss, Y. (2012). “Andromaly”: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems., 38(1), 161–190.
4. Dhamija, R., Tygar, J.D., & Hearst, M. (2006). Why phishing works. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp. 581–590.
5. Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82, 69–82.
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献