The Art of Phishing
暂无分享,去创建一个
[1] Choon Lin Tan,et al. A survey of phishing attacks: Their types, vectors and technical approaches , 2018, Expert Syst. Appl..
[2] Daniel G. Bachrach,et al. 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy , 2014 .
[3] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[4] T. L. McCluskey,et al. Tutorial and critical analysis of phishing websites methods , 2015, Comput. Sci. Rev..
[5] Tian Lin,et al. Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing , 2017, CHI.
[6] Sonia Chiasson,et al. Why phishing still works: User strategies for combating phishing attacks , 2015, Int. J. Hum. Comput. Stud..
[7] Konrad Rieck,et al. Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails , 2018, RAID.
[8] Daniel G. Bachrach,et al. 10 Don’ts on Your Digital Devices , 2014, Apress.
[9] Flaminia L. Luccio,et al. Usable cryptographic QR codes , 2018, 2018 IEEE International Conference on Industrial Technology (ICIT).
[10] Giorgio Fumera,et al. Social Engineering 2.0: A Foundational Work: Invited Paper , 2017, Conf. Computing Frontiers.