共 8 条
[1]
A.-P. W. Group, PHISH ACT TRENDS REP
[2]
[Anonymous], 2002, BITD TRAFF LIGHT
[3]
[Anonymous], PHISHTANK
[4]
D. Associates, 2005, US PHISH AW SURV
[5]
Engin Kirda C. K., 2005, ANN INT COMP SOFTW A
[6]
Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits
[J].
2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014),
2014,
:236-250
[8]
Zhang Y., 2011, IEEE