共 106 条
[1]
Who Uses ITIL in 2020, (2020)
[2]
Ahmad A., Hadgkiss J., Ruighaver A.B., Incident response teams-challenges in supporting the organisational security function, Computer Security, 31, 5, pp. 643-652, (2012)
[3]
Alnajim A.M., Munro M., An anti-phishing approach that uses training intervention for phishing websites detection, Sixth International Conference on Information Technology: New Generations, ITNG, pp. 405-410, (2009)
[4]
Althobaiti K., Vaniea K., Zheng S., Faheem: Explaining urls to people using a slack bot, 2018 Symposium on Digital Behaviour Intervention for Cyber Security (AISB)., pp. 1-8, (2018)
[5]
Asanka Gamagedara Arachchilage N., Love S., Beznosov K., Phishing threat avoidance behaviour: An empirical investigation, Computers in Human Behavior, 60, pp. 185-197, (2016)
[6]
Barrett R., Maglio P.P., Kandogan E., Bailey J.H., Usable autonomic computing systems: The system administrators' perspective, Advanced Engineering Informatics, 19, 3, pp. 213-221, (2005)
[7]
Report Phishing, (2020)
[8]
Botta D., Muldner K., Hawkey K., Beznosov K., Toward understanding distributed cognition in it security management: The role of cues and norms, Cognition, Technology & Work, 13, 2, pp. 121-134, (2011)
[9]
Botta D., Werlinger R., Gagne A., Beznosov K., Iverson L., Fels S.S., Fisher B.D., Towards understanding it security professionals and their tools, Proceedings of the 3rd Symposium on USAble Privacy and Security, SOUPS, 229, pp. 100-111, (2007)
[10]
Burda P., Allodi L., Zannone N., Don't forget the human: A crowdsourced approach to automate response and containment against spear phishing attacks, European Symposium on Security and Privacy. IEEE, Virtual Conference, (2020)