共 71 条
[1]
Abeywardana KY, 2016, PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), P1054, DOI 10.1109/SAI.2016.7556108
[2]
Abramov MV, 2016, PROCEEDINGS OF THE XIX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM 2016), P58, DOI 10.1109/SCM.2016.7519682
[3]
Albladi S., 2016, IEEE INT C CYB COMP, P1, DOI DOI 10.1109/ICCCF.2016.7740435
[4]
Algarni A, 2013, INT CONF INTERNET, P508, DOI 10.1109/ICIST.2013.6747602
[5]
Measuring Source Credibility of Social Engineering Attackers on Facebook
[J].
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016),
2016,
:3686-3695
[7]
Alqatawna J., 2017, Social Media Shaping e-Publishing and Academia, P121, DOI 10.1007/978-3-319-55354-2_10
[8]
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[9]
[Anonymous], 2016, 2016 INT C CYBER SEC
[10]
[Anonymous], 2016, PROC IEEE 17 INT WOR