Phishing

被引:0
|
作者
Dirk Fox
机构
关键词
D O I
10.1007/s11623-021-1521-3
中图分类号
学科分类号
摘要
引用
收藏
页码:717 / 717
相关论文
共 50 条
  • [21] Spear phishing in a barrel: Insights from a targeted phishing campaign
    Burns, A. J.
    Johnson, M. Eric
    Caputo, Deanna D.
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2019, 29 (01) : 24 - 39
  • [22] No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation
    Drury, Vincent
    Meyer, Ulrike
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 646 - 652
  • [23] Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites
    Lee, Woonghee
    Hur, Junbeom
    Kim, Doowon
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1214 - 1230
  • [24] Time Up for Phishing with Effective Anti-Phishing Research Strategies
    Chaudhary, Sunil
    Berki, Eleni
    Li, Linfeng
    Valtanen, Juri
    INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS, 2015, 6 (02) : 49 - 64
  • [25] Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails
    Stojnic, Tatyana
    Vatsalan, Dinusha
    Arachchilage, Nalin A. G.
    SECURITY AND PRIVACY, 2021, 4 (05)
  • [26] Addressing the spectre of phishing: are adequate measures in place to protect victims of phishing?
    Cassim, Fawzia
    COMPARATIVE AND INTERNATIONAL LAW JOURNAL OF SOUTHERN AFRICA-CILSA, 2014, 47 (03): : 401 - 428
  • [27] Recognition of genuine and phishing emails may not be associated with response to phishing attacks
    Crgol, Alex
    Vrhovec, Simon
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (09) : 1265 - 1283
  • [28] Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites
    Drury, Vincent
    Meyer, Ulrike
    PROCEEDINGS OF THE FIFTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2019), 2019, : 211 - 223
  • [29] How Users Investigate Phishing Emails that Lack Traditional Phishing Cues
    Koehler, Daniel
    Puenter, Wenzel
    Meinel, Christoph
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 381 - 411
  • [30] Profiling phishing activity based on hyperlinks extracted from phishing emails
    Yearwood, John
    Mammadov, Musa
    Webb, Dean
    SOCIAL NETWORK ANALYSIS AND MINING, 2012, 2 (01) : 5 - 16