Abstract
No abstract available.
Cited By
- Lin T, Capecci D, Ellis D, Rocha H, Dommaraju S, Oliveira D and Ebner N (2019). Susceptibility to Spear-Phishing Emails, ACM Transactions on Computer-Human Interaction, 26:5, (1-28), Online publication date: 31-Oct-2019.
- Gupta B, Tewari A, Jain A and Agrawal D (2017). Fighting against phishing attacks, Neural Computing and Applications, 28:12, (3629-3654), Online publication date: 1-Dec-2017.
- Jain A, Gupta B and Khan M (2017). Phishing Detection, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
- Verma R and Hossain N Semantic Feature Selection for Text with Application to Phishing Email Detection Information Security and Cryptology -- ICISC 2013, (455-468)
- Arachchilage N and Love S (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior, 29:3, (706-714), Online publication date: 1-May-2013.
- Chhabra S, Aggarwal A, Benevenuto F and Kumaraguru P Phi.sh/$oCiaL Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, (92-101)
- Kumaraguru P, Sheng S, Acquisti A, Cranor L and Hong J (2010). Teaching Johnny not to fall for phish, ACM Transactions on Internet Technology, 10:2, (1-31), Online publication date: 1-May-2010.
- Bose I and Leung A (2008). Assessing anti-phishing preparedness, Decision Support Systems, 45:4, (897-912), Online publication date: 1-Nov-2008.
- Abu-Nimeh S, Nappa D, Wang X and Nair S A comparison of machine learning techniques for phishing detection Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, (60-69)
- Kumaraguru P, Rhee Y, Acquisti A, Cranor L, Hong J and Nunge E Protecting people from phishing Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (905-914)
- Kumaraguru P, Acquisti A and Cranor L Trust modelling for online transactions Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-9)
Index Terms
- Phishing Exposed
Please enable JavaScript to view thecomments powered by Disqus.
Recommendations
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks
It is well-known that the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)-based wireless networks suffer seriously from the hidden terminal problem and the exposed terminal problem. So far, no satisfactory solutions that can resolve ...
Grouping Method Based on Exposed Terminal Detection in IEEE 802.11ah
ICSET 2017: Proceedings of the 2017 International Conference on E-Society, E-Education and E-TechnologyIEEE 802.11ah is targeting at supporting large-scale sensor network scenarios. With thousands of stations, how to access channel efficiently has been an important and challenging issue. According to the IEEE 802.11ah standard, stations are partitioned ...