Funder
National Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Law,General Social Sciences,Pathology and Forensic Medicine
Reference79 articles.
1. Abraham, S., & Chengalur-Smith, I. S. (2010). An overview of social engineering malware. Technology in Society, 32, 183–196.
2. Aleroud, A., & Zhou, L. (2017). Phishing environments, techniques, and countermeasures: A survey. Computers and Security, 68, 160–196.
3. Aurigemma, S., & Mattson, T. (2017). Privilege or procedure. Computers and Security, 66, 218–234.
4. Bachmann, M. (2010). Deciphering the hacker underground. In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime (pp. 105–126). IGI Global.
5. Balleisen, E. J. (2017). Fraud: An American history from Barnum to Madoff. Princeton University Press.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献