Author:
Jain Ankit Kumar,Gupta B. B.
Reference9 articles.
1. Almomani A, Gupta BB, Atawneh S, Meulenberg A, Almomani E (2013) A survey of phishing email filtering techniques. IEEE Commun Surv Tutor 15(4):2070–2090
2. Anti Phishing Work Group (2014) Phishing attacks trends report. http://docs.apwg.org/reports/apwg_trends_report_q2_2014.pdf
3. Kumaraguru P, Rhee Y, Acquisti A, Cranor LF, Hong J, Nunge E (2007) Protecting people from phishing: the design and evaluation of an embedded training email system. In: CHI 2007: proceedings of the SIGCHI conference on human factors in computing systems, ACM, New York, pp 905–914
4. Sheng S, Magnien B, Kumaraguru P, Acquisti A, Cranor LF, Hong J, Nunge E (2007) Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: SOUPS 2007: proceedings of the 3rd symposium on usable privacy and security, ACM, New York, pp 88–99
5. Sheng S, Wardman B, Warner G, Cranor LF, Hong J, Zhang C (2009) An empirical analysis of phishing blacklists. In: CEAS 2009
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献