共 50 条
- [21] An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection [J]. 2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009), 2009, : 105 - +
- [22] AN ENHANCED DEA METHOD FOR GROUP EVALUATION - THE EMPIRICAL STUDY OF ANTI-PHISHING EFFICIENCY [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (11): : 4869 - 4878
- [23] SEFAP: An email system fox anti-phishing [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 782 - +
- [24] POSTER: Proactive Blacklist Update for Anti-Phishing [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1448 - 1450
- [25] An Evaluation of Users' Anti-Phishing Knowledge Retention [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 210 - 214
- [26] A Study of Anti-phishing Strategies Based on TRIZ [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 536 - 538
- [27] A new approach creating an anti-phishing seal [J]. 5th RoEduNet IEEE International Conference, Proceedings, 2006, : 110 - 112
- [28] A Novel Anti-phishing Effectiveness Evaluator Model [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 610 - 618
- [29] An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 405 - 410
- [30] Model for Analysing Anti-Phishing Authentication Ceremonies [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 144 - 150