The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phish with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1995-2007 (18) 2008-2012 (15) 2013-2017 (16) 2018-2020 (15) 2021-2022 (22) 2023-2024 (8)
Publication types (Num. hits)
article(35) inproceedings(59)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 26 occurrences of 20 keywords

Results
Found 94 publication records. Showing 94 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
75Guang Xiang, Jason I. Hong A hybrid phish detection approach by identity discovery and keywords retrieval. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information retrieval, named entity recognition, anti-phishing
47R. N. Karthika, C. Valliyammai, M. Naveena Phish Block: A Blockchain Framework for Phish Detection in Cloud. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
47Bartlomiej Hanus, Yu Andy Wu, James Parrish Phish Me, Phish Me Not. Search on Bibsonomy J. Comput. Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
47Fern Barrientos, Jody L. Jacobs, Shaneé Dawkins Scaling the Phish: Advancing the NIST Phish Scale. Search on Bibsonomy HCI (38) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Yunyi Zhang, Shuyuan Jin Hacks Hit the Phish: Phish Attack Detection Based on Hacks Search. Search on Bibsonomy WASA (3) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Karen Renaud, Gareth Renaud To phish, or not to phish... Search on Bibsonomy Netw. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
47Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner Phish-Net: Investigating phish clusters using drop email addresses. Search on Bibsonomy eCrime The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
36Kai-Jie Chang, Chin-Chen Chang 0001 An e-mail signature protocol for anti-spam work-in-progress. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, spam, signature, phish, e-mail
25Tyler Moore 0001, Richard Clayton 0001 Examining the impact of website take-down on phishing. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electronic crime, phishing, security economics
25Rhiannon Weaver, M. Patrick Collins Fishing for phishes: applying capture-recapture methods to estimate phishing populations. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Hugo da Silva Corrêa Pinto, Luis Otávio Alvares Extended Behavior Networks and Agent Personality: Investigating the Design of Character Stereotypes in the Game Unreal Tournament. Search on Bibsonomy IVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Robert D. Blumofe, Christopher F. Joerg, Bradley C. Kuszmaul, Charles E. Leiserson, Keith H. Randall, Yuli Zhou Cilk: An Efficient Multithreaded Runtime System. Search on Bibsonomy PPoPP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
24Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal Teach LLMs to Phish: Stealing Private Information from Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Aditya Chandrasekar, Manogna Sreenivas, Soma Biswas PhISH-Net: Physics Inspired System for High Resolution Underwater Image Enhancement. Search on Bibsonomy WACV The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Pankaj Pandey, Nishchol Mishra Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Lucas Torrealba Aravena, Pedro Casas, Javier Bustos-Jiménez, Germán Capdehourat, M. Findrik Phish Me If You Can - Lexicographic Analysis and Machine Learning for Phishing Websites Detection with PHISHWEB. Search on Bibsonomy NetSoft The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Megha Sharma, Kuldeep Singh 0005, Palvi Aggarwal, Varun Dutt How well does GPT phish people? An investigation involving cognitive biases and feedback. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuoer Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang 0001, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Vielka Angela V. Adap, Gabriel A. Castillo, Erskine Jerrell M. Delos Reyes, Edward B. Ronquillo, Larry A. Vea Do Not Feed the Phish: Phishing Website Detection Using URL-based Features. Search on Bibsonomy WSSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Matt Dixon, James Nicholson, Dawn Branley-Bell, Pam Briggs, Lynne M. Coventry Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Dawn M. Sarno, Mark B. Neider So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. Search on Bibsonomy Hum. Factors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Jasmine E. McNealy Platforms as phish farms: Deceptive social engineering at scale. Search on Bibsonomy New Media Soc. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Rizwan Ur Rahman, Lokesh Yadav, Deepak Singh Tomar Phish-Shelter: A Novel Anti-Phishing Browser Using Fused Machine Learning. Search on Bibsonomy J. Inf. Technol. Res. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Holly Rosser, Maylene Mayor, Adam Stemmler, Vinod Kumar Ahuja, Andrea Grover, Matthew Hale Phish Finders: Crowd-powered RE for anti-phishing training tools. Search on Bibsonomy RE Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Vincent Drury, Luisa Lux, Ulrike Meyer Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns. Search on Bibsonomy ARES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Xu Lin 0003, Panagiotis Ilia, Saumya Solanki, Jason Polakis Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
24Vinod Kumar Ahuja, Holly K. Rosser, Andrea Grover, Matthew Hale Phish Finders: Improving Cybersecurity Training Tools Using Citizen Science. Search on Bibsonomy ICIS The full citation details ... 2022 DBLP  BibTeX  RDF
24Yuwei Sun, Ng S. T. Chong, Hideya Ochiai Federated Phish Bowl: LSTM-Based Decentralized Phishing Email Detection. Search on Bibsonomy SMC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Michael Koddebusch Exposing the Phish: The Effect of Persuasion Techniques in Phishing E-Mails. Search on Bibsonomy DG.O The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder Better the Phish You Know: Evaluating Personalization in Anti-Phishing Learning Games. Search on Bibsonomy CSEDU (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari Phish What You Wish. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24A. V. Ramana, K. Lakshmanarao, Routhu Srinivasa Rao Stop-Phish: an intelligent phishing detection method using feature selection ensemble. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Nikiforakis Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits. Search on Bibsonomy CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray "X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. Search on Bibsonomy CNS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari Phish What You Wish. Search on Bibsonomy QRS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. Search on Bibsonomy ARES The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter 0001, Alexander Benlian, Joachim Vogt 0002 SoK: Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. Search on Bibsonomy SOUPS @ USENIX Security Symposium The full citation details ... 2021 DBLP  BibTeX  RDF
24Dawn M. Sarno, Joanna E. Lewis, Corey Bohil, Mark B. Neider Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults. Search on Bibsonomy Hum. Factors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Hiba Zuhair Zeydan, Ali Selamat Phish webpage classification using hybrid algorithm of machine learning and statistical induction ratios. Search on Bibsonomy Int. J. Data Min. Model. Manag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Michelle Steves, Kristen K. Greene, Mary Theofanos Categorizing human phishing difficulty: a Phish Scale. Search on Bibsonomy J. Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Sarah Al-Hussaini, Dena Al-Thani, Yin Yang 0001 Are They Likely to Complain on Phish or Spam? A Prediction Model. Search on Bibsonomy BESC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Tobias Urban, Matteo Große-Kampmann, Dennis Tatang, Thorsten Holz, Norbert Pohlmann Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces. Search on Bibsonomy ESORICS (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Adam Vincent Don't feed the phish: how to avoid phishing attacks. Search on Bibsonomy Netw. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24M. Satheesh Kumar, K. G. Srinivasagan 0001, Jalel Ben-Othman Sniff-Phish: A novel framework for resource intensive computation in cloud to detect email scam. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
24Firat Coskun Dalgic, Ahmet Selman Bozkir, Murat Aydos Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
24Routhu Srinivasa Rao, Alwyn Roshan Pais Jail-Phish: An improved search engine based phishing detection system. Search on Bibsonomy Comput. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs. Search on Bibsonomy SecureComm (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs). Search on Bibsonomy WISA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Hossein Shirazi, Kyle Haefner, Indrakshi Ray Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework. Search on Bibsonomy Int. J. Multim. Data Eng. Manag. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Iain Embrey, Kim Kaivanto Many Phish in the C: A Coexisting-Choice-Criteria Model of Security Behavior. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
24Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang 0001, Giovanni Vigna Mechanical Phish: Resilient Autonomous Hacking. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
24Gregory D. Moody, Dennis F. Galletta, Brian Kimball Dunn Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Ana Ferreira 0001, Rui Chilro What to Phish in a Subject? Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. Search on Bibsonomy HAISA The full citation details ... 2017 DBLP  BibTeX  RDF
24James Nicholson, Lynne M. Coventry, Pam Briggs Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. Search on Bibsonomy SOUPS The full citation details ... 2017 DBLP  BibTeX  RDF
24Hossein Shirazi, Kyle Haefner, Indrakshi Ray Fresh-Phish: A Framework for Auto-Detection of Phishing Websites. Search on Bibsonomy IRI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Melanie Volkamer, Karen Renaud, Paul Gerber Spot the phish by checking the pruned URL. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Gaurav Varshney, Manoj Misra, Pradeep K. Atrey A phish detector using lightweight search features. Search on Bibsonomy Comput. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Olga A. Zielinska, Allaire K. Welk, Christopher B. Mayhorn, Emerson R. Murphy-Hill The persuasive phish: examining the social psychological principles hidden in phishing emails. Search on Bibsonomy HotSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Samuel Marchal, Kalle Saari, Nidhi Singh 0001, N. Asokan Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. Search on Bibsonomy ICDCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Samuel Marchal, Kalle Saari, Nidhi Singh 0001, N. Asokan Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
24Rakesh M. Verma, Nirmala Rai Phish-IDetector: Message-Id Based Automatic Phishing Detection. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Hilarie Orman The Compleat Story of Phish. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain Two-Pronged Phish Snagging. Search on Bibsonomy ARES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Mary B. Burns, Alexandra Durcikova, Jeffrey L. Jenkins On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users. Search on Bibsonomy ICIS The full citation details ... 2012 DBLP  BibTeX  RDF
24Hilarie Orman Towards a Semantics of Phish. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Mark Blythe, Helen Petrie, John A. Clark F for fake: four studies on how we fall for phish. Search on Bibsonomy CHI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Gregory D. Moody, Dennis F. Galletta, Jon Walker, Brian Kimball Dunn Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing. Search on Bibsonomy ICIS The full citation details ... 2011 DBLP  BibTeX  RDF
24Michael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson PhorceField: a phish-proof password ceremony. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Tal Moran, Tyler Moore 0001 The Phish-Market Protocol: Secure Sharing Between Competitors. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Brad Wardman The Deadliest Catch: Reeling In Big Phish With a Deep MD5 Net. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong Teaching Johnny not to fall for phish. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Tal Moran, Tyler Moore 0001 The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF roleplay, survey, phishing, user behavior, social engineering, mechanical turk
24Guang Xiang, Bryan A. Pendleton, Jason I. Hong, Carolyn P. Rosé A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham School of phish: a real-word evaluation of anti-phishing training. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF embedded training, real-world studies, email, phishing, usable privacy and security
24Marco Cova, Christopher Kruegel, Giovanni Vigna There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. Search on Bibsonomy WOOT The full citation details ... 2008 DBLP  BibTeX  RDF
24Hal Berghel, James Carpinter, Ju-Yeon Jo Phish Phactors: Offensive and Defensive Strategies. Search on Bibsonomy Adv. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang 0002 Phinding Phish: An Evaluation of Anti-Phishing Toolbars. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
24Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF development and testing, learning science, security user education, game design, phishing, interactive learning, usable privacy and security
24John S. Quarterman PhishScope: Tracking Phish Server Clusters. Search on Bibsonomy J. Digit. Forensic Pract. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Mike Bond Phish and Chips. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch, Ross J. Anderson, Ronald L. Rivest Phish and Chips. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Stefan A. Robila, James W. Ragucci Don't be a phish: steps in user education. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF education, information security, phishing, computer education
24Phil Cracknell Why 'Phish' when you can Trawl? Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Steven A. Myers Helping the Phish Detect the Lure. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Richard Clayton 0001 Who'd Phish from the Summit of Kilimanjaro?. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Evangelos Moustakas, Penny Duquenoy, C. Ranganathan Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
24Rachna Dhamija, J. D. Tygar Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. Search on Bibsonomy HIP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Bradley J. Rhodes PHISH Nets: Planning Heuristically In Situated Hybrid Networks. Search on Bibsonomy Agents The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #94 of 94 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license