共 50 条
- [1] Addressing the spectre of phishing: are adequate measures in place to protect victims of phishing? COMPARATIVE AND INTERNATIONAL LAW JOURNAL OF SOUTHERN AFRICA-CILSA, 2014, 47 (03): : 401 - 428
- [2] TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 120 - 134
- [3] Heuristic Systematic model based guidelines for phishing victims 2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
- [5] From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 49 - 64
- [7] Not All Victims Are Created Equal: Investigating Differential Phishing Susceptibility AUGMENTED COGNITION, PT I, AC 2024, 2024, 14694 : 3 - 21