共 50 条
- [21] A Study of Anti-phishing Strategies Based on TRIZ [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
- [22] A Novel Anti-phishing Effectiveness Evaluator Model [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 610 - 618
- [23] An Evaluation of Users' Anti-Phishing Knowledge Retention [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214
- [24] A new approach creating an anti-phishing seal [J]. 5th RoEduNet IEEE International Conference, Proceedings, 2006, : 110 - 112
- [25] An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 405 - 410
- [26] POSTER: Proactive Blacklist Update for Anti-Phishing [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1448 - 1450
- [27] SEFAP: An email system fox anti-phishing [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 782 - +
- [28] Website Risk Assessment System for Anti-Phishing [J]. FUTURE INFORMATION TECHNOLOGY, PT II, 2011, 185 : 131 - 138
- [29] Survey of Anti-phishing Tools with Detection Capabilities [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 214 - 219
- [30] Model for Analysing Anti-Phishing Authentication Ceremonies [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 144 - 150