Abstract
Phishing remains one of the most pernicious forms of attack. The technical requirements are modest – no exotic zero-day vulnerabilities, no clever hacking techniques. And it leverages one of the hardest weaknesses to fix in the technology environment – human frailty.
Subject
Law,General Computer Science
Cited by
71 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献