|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 75 occurrences of 43 keywords
|
|
|
Results
Found 188 publication records. Showing 188 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
273 | Linfeng Li, Marko Helenius |
Usability evaluation of anti-phishing toolbars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 163-184, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
200 | André Bergholz |
AntiPhish: lessons learnt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 1-2, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
200 | Troy Ronda, Stefan Saroiu, Alec Wolman |
Itrustpage: a user-assisted anti-phishing tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 261-272, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
phishing, anti-phishing |
183 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
A phishing vulnerability analysis of web based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 326-331, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
156 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 782-787, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
151 | Chuan Yue, Haining Wang |
Anti-Phishing in Offense and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 345-354, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
142 | Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel |
On the Effectiveness of Techniques to Detect Phishing Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 20-39, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
134 | Dinei A. F. Florêncio, Cormac Herley |
Analysis and Improvement of Anti-Phishing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 148-157, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
125 | Ye Cao, Weili Han, Yueran Le |
Anti-phishing based on automated individual white-list. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 51-60, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing |
112 | Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade |
B-APT: Bayesian Anti-Phishing Toolbar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1745-1749, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
106 | Abdullah M. Alnajim, Malcolm Munro |
An evaluation of users' tips effectiveness for Phishing websites detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 63-68, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
103 | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 88-99, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
development and testing, learning science, security user education, game design, phishing, interactive learning, usable privacy and security |
87 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 352-355, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Anthony Y. Fu, Xiaotie Deng, Wenyin Liu |
A Potential IRI Based Phishing Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems Engineering - WISE 2005, 6th International Conference on Web Information Systems Engineering, New York, NY, USA, November 20-22, 2005, Proceedings, pp. 618-619, 2005, Springer, 3-540-30017-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Internationalized Resource Identifier (IRI), Internet security, Anti-phishing |
85 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Min Zhang, Xiaotie Deng |
Detection of phishing webpages based on visual similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Special interest tracks and posters) ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005 - Special interest tracks and posters, pp. 1060-1061, 2005, ACM, 1-59593-051-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
web document analysis, information filtering, anti-phishing, visual similarity |
85 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Xiaotie Deng, Min Zhang |
Phishing Webpage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August - 1 September 2005, Seoul, Korea, pp. 560-564, 2005, IEEE Computer Society, 0-7695-2420-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web document analysis, Information filtering, Anti-Phishing |
80 | Indranil Bose, Alvin Chung Man Leung |
Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(8), pp. 141-143, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
80 | Bryan Parno, Cynthia Kuo, Adrian Perrig |
Phoolproof Phishing Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 1-19, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
80 | Ying Pan, Xuhua Ding |
Anomaly Based Web Phishing Page Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 381-392, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 47-61, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
75 | Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
71 | HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song |
A New Anti-phishing Method in OpenID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 243-247, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs |
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 373-382, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
roleplay, survey, phishing, user behavior, social engineering, mechanical turk |
67 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 254-258, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Abdullah M. Alnajim, Malcolm Munro |
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 405-410, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anti-Phishing countermeasures, online fraud, online banking security, Phishing, e-commerce security |
55 | Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung |
Detection of Phishing Attacks: A Machine Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Computing Applications in Industry ![In: Soft Computing Applications in Industry, pp. 373-383, 2008, Springer, 978-3-540-77464-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth |
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 281-293, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Min Wu 0005, Robert C. Miller, Greg Little |
Web wallet: preventing phishing attacks by revealing user intentions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 102-113, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user study, user interface design, world wide web and hypermedia |
51 | Qingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan 0001, Peng Cheng 0011, Charles Chen |
New Anti-phishing Method with Two Types of Passwords in OpenID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGEC ![In: Fifth International Conference on Genetic and Evolutionary Computing, ICGEC 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September 1, 2011, pp. 69-72, 2011, IEEE Computer Society, 978-1-4577-0817-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Two passwords, Single sign on (SSO), OpenID, Anti-phishing |
43 | Ben Adida |
Beamauth: two-factor web authentication with a bookmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 48-57, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
phishing, web security, two-factor authentication |
43 | Rachna Dhamija, J. D. Tygar |
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIP ![In: Human Interactive Proofs, Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings, pp. 127-141, 2005, Springer, 3-540-26001-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Jerry Chih-Yuan Sun, Shih-Jou Yu, Sunny S. J. Lin, Shian-Shyong Tseng |
The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 59, pp. 249-257, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
42 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 70-81, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security |
33 | Anne Clara Tally, Jacob Abbott, Ashley M. Bochner, Sanchari Das, Christena Nippert-Eng |
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 7(CSCW1), pp. 1-27, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda |
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023., pp. 813-821, 2023, SCITEPRESS, 978-989-758-666-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva |
Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.13054, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Rene Roepke, Vincent Drury, Philipp Peeß, Tobias Johnen, Ulrike Meyer, Ulrik Schroeder |
More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GALA ![In: Games and Learning Alliance: 11th International Conference, GALA 2022, Tampere, Finland, November 30 - December 2, 2022, Proceedings, pp. 118-126, 2022, Springer International Publishing, 978-3-031-22124-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Tej Narayan Thakur, Noriaki Yoshiura |
AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIIDS (2) ![In: Intelligent Information and Database Systems - 14th Asian Conference, ACIIDS 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022, Proceedings, Part II, pp. 595-607, 2022, Springer, 978-3-031-21966-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem |
A Systematic Literature Review on Phishing and Anti-Phishing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.01255, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
33 | Tej Narayan Thakur, Noriaki Yoshiura |
AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA (Workshops) ![In: Database Systems for Advanced Applications. DASFAA 2021 International Workshops - BDQM, GDMA, MLDLDSA, MobiSocial, and MUST, Taipei, Taiwan, April 11-14, 2021, Proceedings, pp. 365-380, 2021, Springer, 978-3-030-73215-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
33 | Tej Narayan Thakur, Noriaki Yoshiura |
AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIIDS ![In: Intelligent Information and Database Systems - 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, April 7-10, 2021, Proceedings, pp. 399-412, 2021, Springer, 978-3-030-73279-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
33 | Matheesha Fernando, Nalin Asanka Gamagedara Arachchilage |
Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.13262, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
33 | René Röpke, Klemens Koehler, Vincent Drury, Ulrik Schroeder, Martin R. Wolf, Ulrike Meyer |
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSTEC ![In: Model-driven Simulation and Training Environments for Cybersecurity - Second International Workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers, pp. 41-60, 2020, Springer, 978-3-030-62432-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
33 | Matheesha Fernando, Nalin Asanka Gamagedara Arachchilage |
Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS ![In: Australasian Conference on Information Systems, ACIS 2019, Curtin University, Perth, Australia, December 9-11, 2019., pp. 42, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
33 | Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, Erik Andersen 0001 |
What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, Glasgow, Scotland, UK, May 04-09, 2019, pp. 108, 2019, ACM, 978-1-4503-5970-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
33 | Chuan Pham, Luong Anh Tuan Nguyen, Nguyen Hoang Tran, Eui-Nam Huh, Choong Seon Hong |
Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 15(3), pp. 1076-1089, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
33 | Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner |
Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2018 APWG Symposium on Electronic Crime Research, eCrime 2018, San Diego, CA, USA, May 15-17, 2018, pp. 1-12, 2018, IEEE, 978-1-5386-4922-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
33 | Sunil Chaudhary, Eleni Berki, Linfeng Li, Juri Valtanen |
Time Up for Phishing with Effective Anti-Phishing Research Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Cap. Inf. Technol. Prof. ![In: Int. J. Hum. Cap. Inf. Technol. Prof. 6(2), pp. 49-64, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Srishti Gupta, Ponnurangam Kumaraguru |
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1406.3682, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
33 | Srishti Gupta, Ponnurangam Kumaraguru |
Emerging phishing trends and effectiveness of the anti-phishing landing page. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014, pp. 36-47, 2014, IEEE, 978-1-4799-6509-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Weiwei Zhuang, Qingshan Jiang, Tengke Xiong |
An Intelligent Anti-phishing Strategy Model for Phishing Website Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012, pp. 51-56, 2012, IEEE Computer Society, 978-1-4673-1423-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Abdullah M. Alnajim, Malcolm Munro |
An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 1st International Conference on Intelligent Networking and Collaborative Systems, INCoS 2009, Barcelona, Spain, 4-6 November 2009, pp. 105-112, 2009, IEEE Computer Society, 978-1-4244-5165-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Abdullah M. Alnajim |
Fighting Internet fraud : anti-phishing effectiveness for phishing websites detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2009 |
RDF |
|
31 | Mahmoud Khonji, Andrew Jones 0002, Youssef Iraqi |
A study of feature subset evaluators and feature subset searching methods for phishing classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEAS ![In: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings, pp. 135-144, 2011, ACM, 978-1-4503-0788-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson |
Phoiling phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 749, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Rachna Dhamija, J. Doug Tygar |
The battle against phishing: Dynamic Security Skins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 77-88, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Hossain Shahriar, Mohammad Zulkernine |
Information Source-Based Classification of Automatic Phishing Website Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 190-195, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Anti-phishing technique, information source |
30 | Nuttapong Sanglerdsinlapachai, Arnon Rungsawang |
Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 187-190, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
domain top-page, machine learning, semantic similarity, phishing, anti-phishing |
30 | Guang Xiang, Jason I. Hong |
A hybrid phish detection approach by identity discovery and keywords retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 571-580, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, named entity recognition, anti-phishing |
30 | Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi |
A Proactive Approach to Preventing Phishing Attacks Using Pshark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 915-921, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Phishing e-mail, whois database, Pshark, Anti-phishing |
30 | Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone |
SC@CCO: a Graphic-Based Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 8-15, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password |
30 | Yue Zhang 0002, Jason I. Hong, Lorrie Faith Cranor |
Cantina: a content-based approach to detecting phishing web sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 639-648, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
toolbar, evaluation, phishing, TF-IDF, anti-phishing |
30 | Wenyin Liu, Xiaotie Deng, Guanglin Huang, Anthony Y. Fu |
An Antiphishing Strategy Based on Visual Similarity Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(2), pp. 58-65, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security and Trust, Anti-Phishing, Visual Similarity |
21 | Gaurav Varshney, Rahul Kumawat, Vijay Varadharajan, Udaya Kiran Tupakula, Chandranshu Gupta |
Anti-phishing: A comprehensive perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 238(Part F), pp. 122199, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Subhash Ariyadasa, Shantha Fernando, Subha Fernando |
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 23(2), pp. 1055-1076, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Benjamin Maximilian Berens, Mattia Mossano, Melanie Volkamer |
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 137, pp. 103620, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Orvila Sarker, Sherif Haggag, Asangi Jayatilaka, Chelsea Liu |
Personalized Guidelines for Design, Implementation and Evaluation of Anti-phishing Interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.12827, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Kuldeep Singh 0005, Palvi Aggarwal, Prashanth Rajivan, Cleotilde Gonzalez |
Cognitive elements of learning and discriminability in anti-phishing training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 127, pp. 103105, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Rene Roepke, Johannes Ballmann |
Towards a Competitive Two-Player Anti-phishing Learning Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GALA ![In: Games and Learning Alliance - 12th International Conference, GALA 2023, Dublin, Ireland, November 29 - December 1, 2023, Proceedings, pp. 56-66, 2023, Springer, 978-3-031-49064-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada 0001, Ayako Komatsu |
Does the Anchoring Effect Influence Individuals' Anti-phishing Behavior Intentions? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS (1) ![In: Foundations and Practice of Security - 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I, pp. 141-156, 2023, Springer, 978-3-031-57536-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Anne Clara Tally, Jacob Abbott, Ashley M. Bochner, Sanchari Das, Christena Nippert-Eng |
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees' Current Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023, pp. 621:1-621:13, 2023, ACM, 978-1-4503-9421-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Orvila Sarker, Sherif Haggag, Asangi Jayatilaka, Chelsea Liu |
Personalized Guidelines for Design, Implementation and Evaluation of Anti-Phishing Interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2023, New Orleans, LA, USA, October 26-27, 2023, pp. 1-12, 2023, IEEE, 978-1-6654-5223-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Sebastian Walter Schütz, Zachary R. Steelman, Rhonda A. Syler |
It's not just about accuracy: An investigation of the human factors in users' reliance on anti-phishing tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Support Syst. ![In: Decis. Support Syst. 163, pp. 113846, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Alex Sumner, Xiaohong Yuan, Mohd Anwar, Maranda E. McBride |
Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 62(5), pp. 975-997, September 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Bhawna Sharma, Parvinder Singh |
An improved anti-phishing model utilizing TF-IDF and AdaBoost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(26), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Akanksha Arora, Hitendra Garg, Shivendra Shivani |
Anti-phishing technique based on dynamic image captcha using multi secret sharing scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 88, pp. 103624, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Parvinder Singh, Bhawna Sharma, Jasvinder Kaur |
An anti-phishing model based on similarity measurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. Robotics ![In: Int. J. Comput. Vis. Robotics 12(2), pp. 141-155, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Parvinder Singh, Bhawna Sharma |
Anti-phishing model based on relative content mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. Robotics ![In: Int. J. Comput. Vis. Robotics 12(1), pp. 66-84, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Rizwan Ur Rahman, Lokesh Yadav, Deepak Singh Tomar |
Phish-Shelter: A Novel Anti-Phishing Browser Using Fused Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Technol. Res. ![In: J. Inf. Technol. Res. 15(1), pp. 1-23, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder |
Exploring and Evaluating Different Game Mechanics for Anti-Phishing Learning Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Serious Games ![In: Int. J. Serious Games 9(3), pp. 23-41, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jerry Chih-Yuan Sun, Hsiu-Shan Lin |
Effects of integrating an interactive response system into flipped classroom instruction on students' anti-phishing self-efficacy, collective efficacy, and sequential behavioral patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Educ. ![In: Comput. Educ. 180, pp. 104430, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Holly Rosser, Maylene Mayor, Adam Stemmler, Vinod Kumar Ahuja, Andrea Grover, Matthew Hale |
Phish Finders: Crowd-powered RE for anti-phishing training tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE Workshops ![In: 30th IEEE International Requirements Engineering Conference Workshops, RE 2022 - Workshops, Melbourne, Australia, August 15-19, 2022, pp. 130-135, 2022, IEEE, 978-1-6654-6000-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Andriana Magdalinou, Athena Kalokairinou, Flora Malamateniou, John Mantas |
The Development and Evaluation of an Anti-Phishing E-Learning Intervention for Nurses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EFMI-STC ![In: Digital Professionalism in Health and Care: Developing the Workforce, Building the Future - Proceedings of the EFMI Special Topic Conference, EFMI-STC 2022, Cardiff, Wales, UK, 7- 8 September 2022., pp. 165-166, 2022, IOS Press, 978-1-64368-310-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Dikka Aditya Satria Wibawa, Hermawan Setiawan, Girinoto |
Anti-Phishing Game Framework Based on Extended Design Play Experience (DPE) Framework as an Educational Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBIS ![In: 7th International Workshop on Big Data and Information Security, IWBIS 2022, Depok, Indonesia, October 1-3, 2022, pp. 107-112, 2022, IEEE, 978-1-6654-8950-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Bhupendra Acharya, Phani Vadrevu |
A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings, pp. 156-177, 2022, Springer, 978-3-031-09483-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder |
Better the Phish You Know: Evaluating Personalization in Anti-Phishing Learning Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEDU (2) ![In: Proceedings of the 14th International Conference on Computer Supported Education, CSEDU 2022, Online Streaming, April 22-24, 2022, Volume 2., pp. 458-466, 2022, SCITEPRESS, 978-989-758-562-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Shweta Sankhwar, Dhirendra Pandey, Raees Ahmad Khan, Sachi Nandan Mohanty |
An anti-phishing enterprise environ model using feed-forward backpropagation and Levenberg-Marquardt method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 4(1), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Luigi Gallo, Alessandro Maiello, Alessio Botta, Giorgio Ventre |
2 Years in the anti-phishing group of a large company. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 105, pp. 102259, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | René Röpke, Vincent Drury, Ulrik Schroeder, Ulrike Meyer |
A Modular Architecture for Personalized Learning Content in Anti-Phishing Learning Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Software Engineering (Satellite Events) ![In: Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021., 2021, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Duygu Bayrak, René Röpke, Ulrik Schroeder |
Konzeption und Entwicklung eines interaktiven E-Mail-Interface für Anti-Phishing Lernspiele. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELFI ![In: DELFI 2021 - Die 19. Fachtagung Bildungstechnologien der Gesellschaft für Informatik e.V., online, 13.-15. September 2021., pp. 157-162, 2021, Gesellschaft für Informatik e.V., 978-3-88579-710-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder |
Exploring Different Game Mechanics for Anti-phishing Learning Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GALA ![In: Games and Learning Alliance - 10th International Conference, GALA 2021, La Spezia, Italy, December 1-2, 2021, Proceedings, pp. 34-43, 2021, Springer, 978-3-030-92181-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Rania Zaimi, Mohamed Hafidi, Mahnane Lamia |
A literature survey on anti-phishing in websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NISS (ACM) ![In: NISS2021: The 4th International Conference on Networking, Information Systems & Security, KENITRA, Morocco, April 1 - 2, 2021, pp. 10:1-10:7, 2021, ACM, 978-1-4503-8871-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Kilian Kluge, Regina Eckhardt |
Explaining the Suspicion: Design of an XAI-based User-Focused Anti-Phishing Measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik ![In: Innovation durch Informationssysteme - WI als zukunftsweisende Wissenschaft, 16. Internationale Tagung Wirtschaftsinformatik (WI 2021), March 09-11, 2021, Universität Duisburg-Essen, Germany., 2021, AISeL. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | S. Chanti, T. Chithralekha |
Classification of Anti-phishing Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 1(1), pp. 11:1-11:18, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Jampen, Gürkan Gür, Thomas Sutter, Bernhard Tellenbach |
Don't click: towards an effective anti-phishing training. A comparative literature review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. centric Comput. Inf. Sci. ![In: Hum. centric Comput. Inf. Sci. 10, pp. 33, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Mohith Gowda HR, Adithya MV, Gunesh Prasad S, Vinay S |
Development of anti-phishing browser based on random forest and rule of extraction framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecur. ![In: Cybersecur. 3(1), pp. 20, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé |
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 379-396, 2020, USENIX Association, 978-1-939133-17-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Mattia Mossano, Kami Vaniea, Lukas Aldag, Reyhan Düzgün, Peter Mayer 0001, Melanie Volkamer |
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2020, Genoa, Italy, September 7-11, 2020, pp. 130-139, 2020, IEEE, 978-1-7281-8597-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | René Röpke, Ulrik Schroeder, Vincent Drury, Ulrike Meyer |
Towards Personalized Game-Based Learning in Anti-Phishing Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: 20th IEEE International Conference on Advanced Learning Technologies, ICALT 2020, Tartu, Estonia, July 6-9, 2020, pp. 65-66, 2020, IEEE, 978-1-7281-6090-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Rania Zaimi, Mohamed Hafidi, Mahnane Lamia |
Survey paper: Taxonomy of website anti-phishing solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNAMS ![In: Seventh International Conference on Social Networks Analysis, Management and Security, SNAMS 2020, Virtual Event, France, December 14-16, 2020, pp. 1-8, 2020, IEEE, 978-0-7381-1180-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 188 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|