共 18 条
[2]
Alomari E, 2014, DESIGN DEPLOYMENT US, V2
[3]
[Anonymous], 2007, GIAC SECURITY ESSENT
[4]
Bursztein E. E., 2013, INTERNET WIDE EFFORT
[5]
Downs J. S., 2006, Proceedings of the second symposium on Usable privacy and security, P79, DOI DOI 10.1145/1143120.1143131
[6]
Felten E. W., 2000, P 7 ACM C COMP COMM, P25, DOI [10.1145/352600.352606, DOI 10.1145/352600.352606]
[7]
Halevi T., 2015, PHISHING SELFEFFICAC
[10]
Micro T., 2012, SPEAR PHISHINGEMAIL