共 54 条
- [1] Almomani A., Gupta B.B., Atawneh S., Meulenberg A., Almomani E., A survey of phishing email filtering techniques, IEEE Communications Surveys & Tutorials, 15, 4, pp. 2070-2090, (2013)
- [2] Anand A., Gorde K., Moniz J.R.A., Park N., Chakraborty T., Chu B.-T., Phishing URL detection with oversampling based on text generative adversarial networks, 2018 IEEE International Conference on Big Data (Big Data). IEEE, pp. 1168-1177, (2018)
- [3] Arachchilage N.A.G., Love S., A game design framework for avoiding phishing attacks, Computers in Human Behavior, 29, 3, pp. 706-714, (2013)
- [4] Bahnsen A.C., Bohorquez E.C., Villegas S., Vargas J., Gonzalez F.A., Classifying phishing URLs using recurrent neural networks, 2017 APWG Symposium on Electronic Crime Research (ECrime), pp. 1-8, (2017)
- [5] Benenson Z., Gassmann F., Landwirth R., Unpacking spear phishing susceptibility, FC 2017: Financial Cryptography and Data Security., pp. 610-627, (2017)
- [6] Blythe M., Petrie H., Clark J.A., F for fake: Four studies on how we fall for phish, CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3469-3478, (2011)
- [7] Caputo D.D., Pfleeger S.L., Freeman J.D., Johnson M.E., Going spear phishing: Exploring embedded training and awareness, Security & Privacy, IEEE, 12, 1, pp. 28-38, (2014)
- [8] Cialdini R., Influence: The Psychology of Persuasion (Revised Ed.), (2009)
- [9] Conzola V.C., Wogalter M.S., A Communication-Human Information Processing (C-HIP) approach to warning effectiveness in the workplace, Journal of Risk Research, 4, 4, pp. 309-322, (2001)
- [10] Cowan D.A., Developing a process model of problem recognition, Academy of Management Review, 11, 4, pp. 763-776, (1986)