共 39 条
- [2] Towards Understanding Phishing Victims' Profile 2012 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND INDUSTRIAL INFORMATICS (ICCSII), 2012,
- [3] Phishing Sites and Prevention Measures INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 1 - 10
- [5] Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
- [6] Heuristic Systematic model based guidelines for phishing victims 2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
- [7] From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 49 - 64
- [9] Not All Victims Are Created Equal: Investigating Differential Phishing Susceptibility AUGMENTED COGNITION, PT I, AC 2024, 2024, 14694 : 3 - 21