|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 428 occurrences of 209 keywords
|
|
|
Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Edmon Chung |
Protecting the web: phishing, malware, and other security threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 1253-1254, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, dns |
25 | Naveen Agarwal, Scott G. Renfro, Arturo Bejar |
Phishing Forbidden. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 5(5), pp. 28-32, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Changwei Liu, Sid Stamm |
Fighting unicode-obfuscated spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 45-59, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SpamAssassin, deobfuscated emails, obfuscated emails, spam emails, unicode characters |
25 | Ronald C. Dodge, Aaron J. Ferguson |
Using Phishing for User Email Security Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 454-459, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor |
Trust modelling for online transactions: a phishing scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 11, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Richard Clayton 0001 |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 82-88, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru |
ViWiD : Visible Watermarking Based Defense Against Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 470-483, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Klaus Plößl, Hannes Federrath, Thomas Nowey |
Protection Mechanisms Against Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 20-29, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Markus Jakobsson, Peter Finn, Nathaniel A. Johnson |
Why and How to Perform Fraud Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 66-68, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mary Ellen Zurko, Andrew S. Patrick |
Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 302-306, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
User-centered security, cryptography |
24 | Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez 0001, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan |
Anticipating Hidden Text Salting in Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 396-397, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Ross J. Anderson |
Information Security Economics - and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEON ![In: Deontic Logic in Computer Science, 9th International Conference, DEON 2008, Luxembourg, Luxembourg, July 15-18, 2008. Proceedings, pp. 49, 2008, Springer, 978-3-540-70524-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Timothy W. van der Horst, Kent E. Seamons |
pwdArmor: Protecting Conventional Password-Based Authentications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 443-452, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Harald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 312-319, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 88-103, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ross J. Anderson, Tyler Moore 0001 |
Information Security Economics - and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 68-91, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | M. Patrick Collins, Timothy J. Shimeall, Sidney Faber, Jeff Janies, Rhiannon Weaver, Markus De Shon, Joseph B. Kadane |
Using uncleanliness to predict future botnet addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 93-104, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
botnets, reputation management, blacklists |
24 | Shankar Sastry 0001 |
TRUST: in cyberspace and beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 13, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Steven A. Myers |
Helping the Phish Detect the Lure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 90, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Richard Clayton 0001, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo |
A Chat at the Old Phishin' Hole. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 88, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Markus Huber 0001, Martin Mulazzani, Edgar R. Weippl, Gerhard Kitzler, Sigrun Goluch |
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 15(3), pp. 28-34, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
spam, phishing, Social networking sites, Internet computing |
16 | J. D. Falk, Murray S. Kucherawy |
Battling Spam: The Evolution of Mail Feedback Loops. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 14(6), pp. 68-71, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mail feedback loops, mail abuse reporting format, MARF, complaint feedback loops, abuse reporting format, ARF, email standards, MAAWG, spam, email, Phishing, IETF |
16 | Linda Dailey Paulson |
New Technique Provides Energy Wirelessly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(4), pp. 16-19, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
IEEE 802.15.3c-2009, antiphishing, Phishgig, WiTricity, wireless power, MIT, Living Wall, conductive paint, sensors, phishing, wireless personal area networks, WPANs |
16 | Vassilis Kostakos, Ian Oakley |
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 329-332, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
situated services, trust, phishing, empirical evaluation |
16 | Guanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, Vamsi Paruchuri |
Combating Typo-Squatting for Safer Browsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009, pp. 31-36, 2009, IEEE Computer Society, 978-0-7695-3639-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Typosquatting, Phishing, Pharming |
16 | Chia-Chen Lin 0001, Po-Hsuan Chiang |
A Novel Mutual Authentication Based on Data Embedding Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 274-277, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Phishing, Mutual authentication, Data embedding |
16 | Reshmi Maulik, Nabendu Chaki |
PhishNet: Enhancing the Security Aspect of IMS Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetCoM ![In: First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009, pp. 235-239, 2009, IEEE Computer Society, 978-0-7695-3924-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Vishing, SPIM, Spam, IMS, Phishing, Spoofing |
16 | Erwin P. Rathgeb, Dirk Hoffstadt |
The E-Mail Honeypot System Concept, Implementation and Field Test Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 1-6, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Spam, Phishing, Honeypot |
16 | Tim Kindberg |
Measuring trust in wi-fi hotspots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008, pp. 173-182, 2008, ACM, 978-1-60558-011-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
field study methodology, security, privacy, trust, pervasive computing, Wi-Fi, phishing |
16 | Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering |
Enhancing web browsing security on public terminals using mobile composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008, pp. 94-105, 2008, ACM, 978-1-60558-139-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
crimeware, split-trust, trusted personal device, user interface design, phishing |
16 | Andrew Bortz, Dan Boneh |
Exposing private information by timing web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 621-628, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
web browser design, privacy, phishing, web application security, web spoofing |
16 | ChangHee Lee, Heejo Lee |
A password stretching method using user specific salts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 1215-1216, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
password stretching, user-specific salting, phishing |
16 | Latanya Sweeney |
Protecting Job Seekers from Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(2), pp. 74-78, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
phishing, google, identity theft |
16 | Juline E. Mills, Sookeun Byun |
Cybercrimes against Consumers: Could Biometric Technology Be the Solution? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(4), pp. 64-71, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cybertrust, phishing, cybercrime, pharming |
16 | Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim |
Case Study: Online Banking Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 14-20, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Internet attacks, authentication, case study, phishing, online banking |
16 | Peter Kuper |
A Warning to Industry--Fix It or Lose It. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 56-60, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
endpoint security, authentication, phishing, Internet security, Internet commerce |
16 | Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell |
Protecting browser state from web privacy attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 737-744, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
web browser design, privacy, phishing, web spoofing |
16 | Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin |
Safeguard against unicode attacks: generation and applications of UC-simlist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 917-918, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secure web identity, phishing, unicode |
16 | Sara Sinclair, Sean W. Smith |
The TIPPI Point: Toward Trustworthy Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(4), pp. 68-71, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
TIPPI, authentication methods, phishing |
16 | Paul Madsen, Yuzo Koga, Kenji Takahashi |
Federated identity management for protecting users from ID theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 77-83, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
phishing, identity theft, federated identity |
12 | Baidyanath Biswas, Arunabha Mukhopadhyay, Ajay Kumar, Dursun Delen |
A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Support Syst. ![In: Decis. Support Syst. 177, pp. 114102, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chidimma Opara, Yingke Chen, Bo Wei |
Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 236, pp. 121183, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Gaurav Varshney, Rahul Kumawat, Vijay Varadharajan, Udaya Kiran Tupakula, Chandranshu Gupta |
Anti-phishing: A comprehensive perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 238(Part F), pp. 122199, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Richa Goenka, Meenu Chawla, Namita Tiwari |
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 23(2), pp. 819-848, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Subhash Ariyadasa, Shantha Fernando, Subha Fernando |
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 23(2), pp. 1055-1076, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fouad Trad, Ali Chehab |
Prompt Engineering or Fine-Tuning? A Case Study on Phishing Detection with Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. Knowl. Extr. ![In: Mach. Learn. Knowl. Extr. 6(1), pp. 367-384, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Peter K. K. Loh, Aloysius Z. Y. Lee, Vivek Balachandran |
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 16(3), pp. 86, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Zhengyang Fan, Wanru Li, Kathryn Blackmond Laskey, Kuo-Chu Chang |
Investigation of Phishing Susceptibility with Explainable Artificial Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 16(1), pp. 31, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Emmanuel Song Shombot, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed |
An application for predicting phishing attacks: A case of implementing a support vector machine learning model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Secur. Appl. ![In: Cyber Secur. Appl. 2, pp. 100036, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fang Feng, Qingguo Zhou, Zebang Shen, Xuhui Yang, Lihong Han, Jinqiang Wang |
The application of a novel neural network in the detection of phishing websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 15(3), pp. 1865-1879, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Faisal Alsubaei, Abdulwahab Ali Almazroi, Nasir Ayub |
Enhancing Phishing Detection: A Novel Hybrid Deep Learning Framework for Cybercrime Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 8373-8389, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ivan Skula, Michal Kvet |
A Framework for Preparing a Balanced and Comprehensive Phishing Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 53610-53622, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Seunguk Yu, Yejin Kwon, Minju Kim, Ki-Seong Lee |
Korean Voice Phishing Detection Applying NER With Key Tags and Sentence-Level N-Gram. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 52951-52962, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ozgur Koray Sahingoz, Ebubekir Buber, Emin Kugu |
DEPHIDES: Deep Learning Based Phishing Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 8052-8070, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park |
Devising and Detecting Phishing Emails Using Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 42131-42146, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Manu J. Pillai, S. Remya, V. Devika, Somula Ramasubbareddy, Yongyun Cho |
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 19375-19387, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daojing He, Xin Lv, Shanshan Zhu, Sammy Chan, Kim-Kwang Raymond Choo |
A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(2), pp. 2236-2243, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Maria Carla Calzarossa, Paolo Giudici, Rasha Zieni |
Explainable machine learning for phishing feature detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Qual. Reliab. Eng. Int. ![In: Qual. Reliab. Eng. Int. 40(1), pp. 362-373, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Haojie Sun, Zhaowei Liu, Shenqiang Wang, Haiyang Wang |
Adaptive Attention-Based Graph Representation Learning to Detect Phishing Accounts on the Ethereum Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Sci. Eng. ![In: IEEE Trans. Netw. Sci. Eng. 11(3), pp. 2963-2975, May - June 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Saba Aslam, Hafsa Aslam, Arslan Manzoor, Hui Chen, Abdur Rasool |
AntiPhishStack: LSTM-Based Stacked Generalization Model for Optimized Phishing URL Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 16(2), pp. 248, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jintao Luo, Jiwei Qin, Ruijin Wang, Lu Li |
A Phishing Account Detection Model via Network Embedding for Ethereum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 71(2), pp. 622-626, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sri Charan Gundla, M. Praveen Karthik, Middi Jashwanth Kumar Reddy, Gourav, Ashutosh Pankaj, Z. Stamenkovic, S. P. Raja 0001 |
A Feature Extraction Approach for the Detection of Phishing Websites Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 33(2), January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Dongjie Liu, Jong-Hyouk Lee |
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 32(1), pp. 8, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Tulsi Pawan Fowdur, M. A. N. Shaikh Abdoolla, Lokeshwar Doobur |
Performance analysis of edge, fog and cloud computing paradigms for real-time video quality assessment and phishing detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Pervasive Comput. Commun. ![In: Int. J. Pervasive Comput. Commun. 20(1), pp. 99-125, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sanjeev Shukla, Manoj Misra, Gaurav Varshney |
HTTP header based phishing attack detection using machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 35(1), January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba 0001 |
ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.18093, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar 0001 |
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.13199, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad |
Large Language Model Lateral Spear Phishing: A Comparative Study in Large-Scale Organizational Settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.09727, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das |
Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08363, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Tosin Ige, Christopher Kiekintveld, Aritran Piplai |
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.17249, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xiaowei Chen, Margault Sacré, Gabriele Lenzini, Samuel Greiff, Verena Distler, Anastasia Sergeeva |
The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design Experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.11862, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yuexin Li, Chengyu Huang, Shumin Deng, Mei Lin Lock, Tri Cao, Nay Oo, Bryan Hooi, Hoon Wei Lim |
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.02253, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Timko, Muhammad Lutfor Rahman |
Smishing Dataset I: Phishing SMS Dataset from Smishtank.com. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.18430, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed |
A Sophisticated Framework for the Accurate Detection of Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.09735, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Furkan Çolhak, Mert Ilhan Ecevit, Bilal Emir Uçar, Reiner Creutzburg, Hasan Dag |
Phishing Website Detection through Multi-Model Analysis of HTML Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.04820, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Nahmias, Gal Engelberg, Dan Klein, Asaf Shabtai |
Prompted Contextual Vectors for Spear-Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08309, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohammad Amaz Uddin, Iqbal H. Sarker |
An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.13871, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Van Nguyen, Tingmin Wu, Xingliang Yuan, Marthie Grobler, Surya Nepal, Carsten Rudolph |
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.17092, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool |
AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08947, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Avijit Gayen, Sukriti Santra, Ayush Dey, Angshuman Jana |
A Network Model to Study the Underlying Characteristics of Phishing Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. Lett. ![In: IEEE Netw. Lett. 6(1), pp. 46-49, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jan Pfeiffer |
OLG Frankfurt: Keine Haftung der Bank nach Phishing-Angriff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. und Recht ![In: Comput. und Recht 40(3), pp. 30-, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jieli Liu, Jinze Chen, Jiajing Wu, Zhiying Wu, Junyuan Fang, Zibin Zheng |
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 3038-3050, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li |
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 138, pp. 103668, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Erzhou Zhu, Kang Cheng, Zhizheng Zhang 0010, Huabin Wang |
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 136, pp. 103561, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Benjamin Maximilian Berens, Mattia Mossano, Melanie Volkamer |
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 137, pp. 103620, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Liliana Ribeiro, Inês Sousa Guedes, Carla Sofia Cardoso |
Which factors predict susceptibility to phishing? An empirical study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 136, pp. 103558, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Arvind Prasad, Shalini Chandra |
PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 136, pp. 103545, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar |
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 208, pp. 111899, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Najwa Altwaijry, Isra Al-Turaiki, Reem Alotaibi, Fatimah Alakeel |
Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(7), pp. 2077, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Nagunwa |
AI-driven approach for robust real-time detection of zero-day phishing websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 23(1), pp. 79-118, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jackie Scott, Yair Levy, Wei Li 0025, Ajoy Kumar |
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 643-651, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das |
Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 16th International Conference on COMmunication Systems & NETworkS, COMSNETS 2024, Bengaluru, India, January 3-7, 2024, pp. 430-432, 2024, IEEE, 979-8-3503-8311-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Kumar Mangalam, Basant Subba |
PhishDetect: A BiLSTM based phishing URL detection framework using FastText embeddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 16th International Conference on COMmunication Systems & NETworkS, COMSNETS 2024, Bengaluru, India, January 3-7, 2024, pp. 637-641, 2024, IEEE, 979-8-3503-8311-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sultan Asiri, Yang Xiao 0001, Saleh Alzahrani |
Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 2024 ACM Southeast Conference, ACM SE 2024, Marietta, GA, USA, April 18-20, 2024, pp. 77-85, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Kelvin Ovabor |
Cloud-Secure: An Investigation into Firefly and Grey Wolf Optimization Algorithms for Phishing Detection with Machine Learning Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE (2) ![In: Proceedings of the 55th ACM Technical Symposium on Computer Science Education, SIGCSE 2024, Volume 2, Portland, OR, USA, March 20-23, 2024, pp. 1887, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ingvar Tjøstheim |
Exploring Data-Disclosure Vulnerabilities and Phishing Assessed by the Cognitive Reflection Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 4754-4763, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Yousra Javed, Iqra Irfan |
An Empirical Evaluation of the Current State of Phishing Comprehension in Pakistan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 7655-7662, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Jordan Mazur, Christopher Rouff, Ali Tekeoglu |
ACPPS: Autonomic Computing based Phishing Protection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 14th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2024, Las Vegas, NV, USA, January 8-10, 2024, pp. 564-569, 2024, IEEE, 979-8-3503-6013-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Robin Chataut, Prashnna Kumar Gyawali, Yusuf Usman |
Can AI Keep You Safe? A Study of Large Language Models for Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 14th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2024, Las Vegas, NV, USA, January 8-10, 2024, pp. 548-554, 2024, IEEE, 979-8-3503-6013-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 2033 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|