Funder
National Science Foundation
Publisher
Public Library of Science (PLoS)
Reference57 articles.
1. Zhao R, John SE, Karas S, Bussell CA, Roberts J, Six D, et al. The highly insidious extreme phishing attacks. Proc IEEE Int Conf Comput Commun Networks (ICCCN); 2016.
2. Yue C. The devil is phishing: Rethinking web single sign-on systems security. Proc 6th USENIX Work Large-Scale Exploit Emergent Threat; 2013.
3. Something smells phishy: Exploring definitions, consequences, and reactions to phishing;CM Kelley;Proc Hum Fact Ergon Soc Annu Meet,2012
4. College student Web use, perceptions of information credibility, and verification behavior;MJ Metzger;Comput Educ,2003
5. Sheng S, Holbrook M, Kumaraguru P, Cranor LF, Downs J. Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. Proceedings of the 28th International Conference on Human Factors in Computing Systems—CHI’10; 2010.
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献