Spear phishing: Diagnosing attack paradigm
暂无分享,去创建一个
[1] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[2] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[3] Xavier Perramon,et al. Phishing Secrets: History, Effects, Countermeasures , 2010, Int. J. Netw. Secur..
[4] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[5] Shujun Li,et al. A novel anti-phishing framework based on honeypots , 2009, 2009 eCrime Researchers Summit.
[6] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[7] Christopher Krügel,et al. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.
[8] Xavier Perramon,et al. Phishing Secrets: History, Effects, Countermeasures , 2010, International Journal of Network Security.
[9] Lorrie Faith Cranor,et al. Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.
[10] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[11] F. Aloul. The Need for Effective Information Security Awareness , 2011 .