Author:
Aneesh Kini U.,Poornananda Bhat M.,Ganiga Raghavendra,Pai Radhika M.,Manohara Pai M. M.,Shiva Prasad H. C.
Reference19 articles.
1. Taylor K, Murty J, (January, 2003) Implementing role based access control for federated information systems on the web. In: Proceedings of the Australasian information security workshop conference on ACSW frontiers, vol 21. Australian Computer Society, Inc pp 87–95
2. Pedrycz W, Chen SM (eds) (2014) Information granularity, big data, and computational intelligence, vol 8. Springer
3. Clark DD (1991) Computers at risk: safe computing in the information age, National Research Council. The National Academies Press, Washington, DC https://doi.org/10.17226/1581
4. Garera S, Provos N, Chew M, Rubin AD (November 2007) A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM workshop on recurring malcode. ACM, pp. 1–8
5. APWG (2016) Phishing activity trends report. [Online] Available: https://apwg.org/apwg-news-center/