共 50 条
- [21] A Honeypots Based Anti-Phishing Framework [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 618 - 625
- [22] Visual security is feeble for Anti-Phishing [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 118 - 123
- [23] Mobile anti-phishing: Approaches and challenges [J]. INFORMATION SECURITY JOURNAL, 2019, 28 (06): : 178 - 193
- [25] Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page [J]. PROCEEDINGS OF THE 2014 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2014,
- [26] An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection [J]. 2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009), 2009, : 105 - +
- [27] POSTER: Proactive Blacklist Update for Anti-Phishing [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1448 - 1450
- [28] An Evaluation of Users' Anti-Phishing Knowledge Retention [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214
- [29] A Study of Anti-phishing Strategies Based on TRIZ [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
- [30] A new approach creating an anti-phishing seal [J]. 5th RoEduNet IEEE International Conference, Proceedings, 2006, : 110 - 112