The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phishing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2005 (47) 2006 (67) 2007 (68) 2008 (76) 2009 (72) 2010 (55) 2011 (53) 2012 (45) 2013 (54) 2014 (68) 2015 (61) 2016 (90) 2017 (90) 2018 (105) 2019 (153) 2020 (192) 2021 (201) 2022 (235) 2023 (239) 2024 (62)
Publication types (Num. hits)
article(850) data(2) incollection(11) inproceedings(1144) phdthesis(25) proceedings(1)
Venues (Conferences, Journals, ...)
CoRR(175) IEEE Access(48) Comput. Secur.(44) eCrime(37) HICSS(19) CHI(18) Expert Syst. Appl.(18) CCS(17) WWW(17) Financial Cryptography(16) IEEE Secur. Priv.(16) ISI(16) HAISA(15) AMCIS(14) ARES(14) USENIX Security Symposium(14) More (+10 of total 795)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 428 occurrences of 209 keywords

Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Omran Salem, Alamgir Hossain, Mumtaz Kamala Awareness Program and AI based Tool to Reduce Risk of Phishing Attacks. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Intelligent tool, Security, Fuzzy Logic, Phishing, Social Engineering
29Jordan Crain, Lukasz Opyrchal, Atul Prakash 0001 Fighting Phishing with Trusted Email. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, spam, email, phishing
29Hossain Shahriar, Mohammad Zulkernine PhishTester: Automatic Testing of Phishing Attacks. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF application behavior model, heuristic coveage, finite state machine, Phishing, cross site scripting
29Shinta Nakayama, Hiroshi Yoshiura, Isao Echizen Preventing False Positives in Content-Based Phishing Detection. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, Internet, network, phishing
29Md. Rafiqul Islam 0001, Jemal H. Abawajy, Matthew J. Warren Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling. Search on Bibsonomy ISPAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF analyser, classifiers, Phishing, multi-tier
29Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai "Reminder: please update your details": Phishing Trends. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF worms and trojon, spam, Phishing, virus, social engineering
29Amir Herzberg, Ahmad Jbara Security and identification indicators for browsers against spoofing and phishing attacks. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Human-computer interaction, phishing, secure usability, Web spoofing
29David Geer Security Technologies Go Phishing. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF computer fraud, security, phishing, hackers
28Ahmed Obied, Reda Alhajj Fraudulent and malicious sites on the web. Search on Bibsonomy Appl. Intell. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming
28Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate Authenticating ubiquitous services: a study of wireless hotspot access. Search on Bibsonomy UbiComp The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, wi-fi, phishing, ubiquitous services
28Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
28Paul C. van Oorschot, Tao Wan 0004 TwoStep: An Authentication Method Combining Text and Graphical Passwords. Search on Bibsonomy MCETECH The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Phishing, User Authentication, Graphical Passwords
28Aniello Castiglione, Roberto De Prisco, Alfredo De Santis Do You Trust Your Phone? Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security
28Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk Provably secure browser-based user-aware mutual authentication over TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF browser-based protocols, phishing, user authentication, TLS
28Frederik De Keukelaere, Sumeer Bhola, Michael Steiner 0001, Suresh Chari, Sachiko Yoshihama SMash: secure component model for cross-domain mashups on unmodified browsers. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web 2.0, mashup, phishing, browser, component model
28Markus Jakobsson, Sid Stamm Invasive browser sniffing and countermeasures. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser cache, sniffing, personalization, phishing, cascading style sheets
28Ari Juels, Markus Jakobsson, Tom N. Jagatic Cache Cookies for Browser Authentication (Extended Abstract). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache cookies, privacy, personalization, malware, Web browser, phishing, pharming
28Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu Hacking Tricks Toward Security on Network Environments. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing
28George Lawton E-Mail Authentication Is Here, but Has It Arrived Yet? Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF E-mail authentication, Spam, Phishing
28Neal Leavitt Instant Messaging: A New Target for Hackers. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security risks, instant messaging, phishing, malicious code
28Bruce Schneier Customers, Passwords, and Web Sites. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Trojans, stealing passwords, phishing
25Daniel Köhler, Wenzel Pünter, Christoph Meinel How Users Investigate Phishing Emails that Lack Traditional Phishing Cues. Search on Bibsonomy ACNS (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Lina Zhou, Jaewan Lim, Dongsong Zhang The Effects of Email Illegitimacy and Phishing Behavior Training on Eye Movement Behavior in Spear Phishing Detection. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
25Luis Felipe Castaño, Eduardo Fidalgo Fernandez, Rocío Alaíz-Rodríguez, Enrique Alegre PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Anne Clara Tally, Jacob Abbott, Ashley M. Bochner, Sanchari Das, Christena Nippert-Eng What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Elisabeth J. D. Slifkin, Mark B. Neider Phishing interrupted: The impact of task interruptions on phishing email classification. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Nathan Beu, Asangi Jayatilaka, Mansooreh Zahedi, Ali Babar 0001, Laura Hartley, Winston Lewinsmith, Irina Baetu Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. Search on Bibsonomy SECRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirrnare, Vivek Balachandran, Tamal Das Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector. Search on Bibsonomy SOLI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25David Hasselquist, Elsa Kihlberg Gawell, Axel Karlström, Niklas Carlsson Phishing in Style: Characterizing Phishing Websites in the Wild. Search on Bibsonomy TMA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Sayak Saha Roy, Unique Karanjit, Shirin Nilizadeh Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services. Search on Bibsonomy IMC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Fiona Carroll, John Ayooluwa Adejobi, Reza Montasari How Good Are We at Detecting a Phishing Attack? Investigating the Evolving Phishing Attack Email and Why It Continues to Successfully Deceive Society. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Filipo Sharevski, Peter Jachim "Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Marcus A. Butavicius, Ronnie Taib, Simon Jerome Han Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Aymen Hamoud, Esma Aïmeur, Mohamed Benmohammed Individual Processing of Phishing Emails: Towards a Phishing Detection Framework. Search on Bibsonomy Int. J. Secur. Priv. Pervasive Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Daniel Alejandro Barreiro Herrera, Jorge Eliecer Camargo Mendoza A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detection. Search on Bibsonomy ICAI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Rene Roepke, Vincent Drury, Philipp Peeß, Tobias Johnen, Ulrike Meyer, Ulrik Schroeder More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails. Search on Bibsonomy GALA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Leon Kersten, Pavlo Burda, Luca Allodi, Nicola Zannone Investigating the Effect of Phishing Believability on Phishing Reporting. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Tej Narayan Thakur, Noriaki Yoshiura AntiPhiMBS-TRN: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Transaction Level. Search on Bibsonomy ACIIDS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Kanishka Misra, Julia Taylor Rayz LMs go Phishing: Adapting Pre-trained Language Models to Detect Phishing Emails. Search on Bibsonomy WI/IAT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Tatyana Stojnic, Dinusha Vatsalan, Nalin A. G. Arachchilage Phishing email strategies: Understanding cybercriminals' strategies of crafting phishing emails. Search on Bibsonomy Secur. Priv. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Ahmed Abbasi, David G. Dobolyi, Anthony Vance, Fatemeh Mariam Zahedi The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem A Systematic Literature Review on Phishing and Anti-Phishing Techniques. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
25Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans A phishing Mitigation Solution using Human Behaviour and Emotions that Influence the Success of Phishing Attacks. Search on Bibsonomy UMAP (Adjunct Publication) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Joseph Aneke, Carmelo Ardito, Giuseppe Desolda Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Sven Schöbel, Rene Roepke, Ulrik Schroeder Phishing Academy: Evaluation of a Digital Educational Game on URLs and Phishing. Search on Bibsonomy GALA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Hugo L. J. Bijmans, Tim M. Booij, Anneke Schwedersky, Aria Nedgabat, Rolf van Wegberg Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2021 DBLP  BibTeX  RDF
25Tej Narayan Thakur, Noriaki Yoshiura AntiPhiMBS-Auth: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Authentication Level. Search on Bibsonomy DASFAA (Workshops) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Tej Narayan Thakur, Noriaki Yoshiura AntiPhiMBS: A New Anti-phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level. Search on Bibsonomy ACIIDS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Florian Quinkert, Martin Degeling, Thorsten Holz Spotlight on Phishing: A Longitudinal Study on Phishing Awareness Trainings. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Rui Chen 0002, Joana Gaia, H. Raghav Rao An examination of the effect of recent phishing encounters on phishing susceptibility. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Matheesha Fernando, Nalin Asanka Gamagedara Arachchilage Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Alessandro Ecclesie Agazzi Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Piers Bayl-Smith, Daniel Sturman, Mark W. Wiggins Cue Utilization, Phishing Feature and Phishing Email Detection. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25René Röpke, Klemens Koehler, Vincent Drury, Ulrik Schroeder, Martin R. Wolf, Ulrike Meyer A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education. Search on Bibsonomy MSTEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Vincent Drury, Ulrike Meyer No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Manuel Sánchez-Paniagua, Eduardo Fidalgo, Víctor González-Castro, Enrique Alegre Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection. Search on Bibsonomy CISIS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Daniel E. O'Leary What Phishing E-mails Reveal: An Exploratory Analysis of Phishing Attempts Using Text Analysis. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25A. J. Burns 0001, M. Eric Johnson, Deanna D. Caputo Spear phishing in a barrel: Insights from a targeted phishing campaign. Search on Bibsonomy J. Organ. Comput. Electron. Commer. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Matheesha Fernando, Nalin Asanka Gamagedara Arachchilage Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? Search on Bibsonomy ACIS The full citation details ... 2019 DBLP  BibTeX  RDF
25Ghassan Ahmed Ali Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails. Search on Bibsonomy IRICT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, Erik Andersen 0001 What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game. Search on Bibsonomy CHI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Ulrike Meyer, Vincent Drury Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites. Search on Bibsonomy SOUPS @ USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
25Chuan Pham, Luong Anh Tuan Nguyen, Nguyen Hoang Tran, Eui-Nam Huh, Choong Seon Hong Phishing-Aware: A Neuro-Fuzzy Approach for Anti-Phishing on Fog Networks. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Jaclyn Martin, Chad Dubé, Michael D. Coovert Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks. Search on Bibsonomy Hum. Factors The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Gary Warner Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. Search on Bibsonomy eCrime The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Alberto Giaretta 0001, Nicola Dragoni Community Targeted Phishing - A Middle Ground Between Massive and Spear Phishing Through Natural Language Generation. Search on Bibsonomy SEDA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Edwin Donald Frauenstein An Investigation into Students Responses to Various Phishing Emails and Other Phishing-Related Behaviours. Search on Bibsonomy ISSA (Revised Selected Papers) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Daniela Oliveira 0001, Harold Rocha, Huizi Yang, Donovan M. Ellis, Sandeep Dommaraju, Melis Muradoglu, Devon Weir, Adam Soliman, Tian Lin, Natalie C. Ebner Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. Search on Bibsonomy CHI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Brynne Harrison, Elena Svetieva, Arun Vishwanath Individual processing of phishing emails: How attention and elaboration protect against phishing. Search on Bibsonomy Online Inf. Rev. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
25Jerry Chih-Yuan Sun, Shih-Jou Yu, Sunny S. J. Lin, Shian-Shyong Tseng The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Brynne Harrison, Arun Vishwanath, H. Raghav Rao A User-Centered Approach to Phishing Susceptibility: The Role of a Suspicious Personality in Protecting Against Phishing. Search on Bibsonomy HICSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Sunil Chaudhary, Eleni Berki, Linfeng Li, Juri Valtanen Time Up for Phishing with Effective Anti-Phishing Research Strategies. Search on Bibsonomy Int. J. Hum. Cap. Inf. Technol. Prof. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Swapan Purkait Examining the effectiveness of phishing filters against DNS based phishing attacks. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson Why phishing still works: User strategies for combating phishing attacks. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. Search on Bibsonomy ACIS The full citation details ... 2015 DBLP  BibTeX  RDF
25Srishti Gupta, Ponnurangam Kumaraguru Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
25Eric Rutger Leukfeldt Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Srishti Gupta, Ponnurangam Kumaraguru Emerging phishing trends and effectiveness of the anti-phishing landing page. Search on Bibsonomy eCrime The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Rucha Tembe, Olga A. Zielinska, Yuqi Liu, Kyung Wha Hong, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Xi Ge Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples. Search on Bibsonomy HotSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Nadina Hintz, Markus Engelberth, Zinaida Benenson, Felix C. Freiling Phishing still works: Erfahrungen und Lehren aus der Durchführung von Phishing-Experimenten. Search on Bibsonomy Sicherheit The full citation details ... 2014 DBLP  BibTeX  RDF
25K. Jansson, Rossouw von Solms Phishing for phishing awareness. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Ammar Almomani, Brij B. Gupta, Tat Chee Wan, Altyeb Altaher, Selvakumar Manickam Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
25Weibo Chu, Bin B. Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Jingguo Wang, Tejaswini C. Herath, Rui Chen 0002, Arun Vishwanath, H. Raghav Rao Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. Search on Bibsonomy IEEE Trans. Prof. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25John Yearwood, Musa A. Mammadov, Dean Webb Profiling phishing activity based on hyperlinks extracted from phishing emails. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Weiwei Zhuang, Qingshan Jiang, Tengke Xiong An Intelligent Anti-phishing Strategy Model for Phishing Website Detection. Search on Bibsonomy ICDCS Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Sophie Gastellier-Prevost Vers une détection des attaques de phishing et pharming côté client. (Defeating phishing and pharming attacks at the client-side). Search on Bibsonomy 2011   RDF
25Gang Liu, Bite Qiu, Liu Wenyin Automatic Detection of Phishing Target from Phishing Webpage. Search on Bibsonomy ICPR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Maher Ragheb Mohammed Abur-rous Phishing website detection using intelligent data mining techniques : design and development of an intelligent association classification mining fuzzy based scheme for phishing website detection with an emphasis on e-banking. Search on Bibsonomy 2010   RDF
25Abdullah M. Alnajim, Malcolm Munro An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection. Search on Bibsonomy INCoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Abdullah M. Alnajim Fighting Internet fraud : anti-phishing effectiveness for phishing websites detection. Search on Bibsonomy 2009   RDF
25Peter Henry A Review of: "Phishing Exposed: Uncover Secrets from the Dark Side. By Lance James Phishing: Cutting the Identity Theft Line. By Rachel Lininger and Russell Dean Uines". Search on Bibsonomy J. Digit. Forensic Pract. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Christopher Abad The economy of phishing: A survey of the operations of the phishing market. Search on Bibsonomy First Monday The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hirofumi Suzuki PAKE-based mutual HTTP authentication for preventing phishing attacks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF http, mutual authentication, web systems
Displaying result #101 - #200 of 2033 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license