Columns on Last Page Should Be Made As Close As Possible to Equal Length
暂无分享,去创建一个
[1] A. Z. Spector,et al. Achieving application requirements , 1990 .
[2] Larry L. Peterson,et al. Reasoning about naming systems , 1993, TOPL.
[3] Michael Sannella,et al. Constraint satisfaction and debugging for interactive user interfaces , 1994 .
[4] Gary Marchionini,et al. A study on video browsing strategies , 1997 .
[5] Bernd Fröhlich,et al. The cubic mouse: a new device for three-dimensional input , 2000, CHI.
[6] George Forman,et al. An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..
[7] Hong Hua,et al. A widget framework for augmented interaction in SCAPE , 2003, UIST '03.
[8] Avivah Litan. Phishing Attack Victims Likely Targets for Identity Theft , 2005 .
[9] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[10] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[11] P. Coulton,et al. Columns on Last Page Should Be Made As Close As Possible to Equal Length , 2006 .
[12] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[13] Markus Jakobsson,et al. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .
[14] Yuen-Tak Yu,et al. A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions , 2006, J. Syst. Softw..
[15] Stefan Görling,et al. An overview of the Sender Policy Framework (SPF) as an anti-phishing mechanism , 2007, Internet Res..
[16] Stuart E. Schechter,et al. The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .
[17] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[18] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[19] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[20] Lorrie Faith Cranor,et al. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer , 2007, eCrime '07.
[21] Desney S. Tan,et al. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks , 2007, Financial Cryptography.
[22] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[23] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[24] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[25] Cormac Herley,et al. A profitless endeavor: phishing as tragedy of the commons , 2009, NSPW '08.
[26] Christopher Krügel,et al. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.
[27] Lorrie Faith Cranor,et al. Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.
[28] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[29] Cormac Herley,et al. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy , 2009, WEIS.
[30] Jason I. Hong,et al. A hybrid phish detection approach by identity discovery and keywords retrieval , 2009, WWW '09.
[31] Carolyn Penstein Rosé,et al. A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection , 2010, ESORICS.
[32] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[33] Lorrie Faith Cranor,et al. Teaching Johnny not to fall for phish , 2010, TOIT.
[34] Philip Tavel,et al. Modeling and Simulation Design , 2011 .