The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for antiphishing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2006-2023 (13)
Publication types (Num. hits)
article(10) inproceedings(3)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6 occurrences of 6 keywords

Results
Found 13 publication records. Showing 13 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
93Wenyin Liu, Xiaotie Deng, Guanglin Huang, Anthony Y. Fu An Antiphishing Strategy Based on Visual Similarity Assessment. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security and Trust, Anti-Phishing, Visual Similarity
34David M. Hull, Sebastian Walter Schuetz, Paul Benjamin Lowry Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
34Satheesh Kumar Marimuthu, Srinivasagan Kalampatti Gopalasamy, Jalel Ben-Othman Intelligent antiphishing framework to detect phishing scam: A hybrid classification approach. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
34Mohammad Faisal, Sa'ed Abed Cluster-Based Antiphishing (CAP) Model for Smart Phones. Search on Bibsonomy Sci. Program. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
34Luca Allodi, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone The Need for New Antiphishing Measures Against Spear-Phishing Attacks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
34Guang-Gang Geng, Zhiwei Yan, Jong-Hyouk Lee, Xiao-Bo Jin, Dongjie Liu An Efficient Antiphishing Method to Secure eConsume. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
34Liu Wenyin, Gang Liu, Bite Qiu, Xiaojun Quan Antiphishing through Phishing Target Discovery. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Indranil Bose, Alvin Chung Man Leung Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks? Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Antonio San Martino, Xavier Perramon Defending E-Banking Services: Antiphishing Approach. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Antonio San Martino, Xavier Perramon A Model for Securing E-Banking Authentication Process: Antiphishing Approach. Search on Bibsonomy SERVICES I The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Linda Dailey Paulson New Technique Provides Energy Wirelessly. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF IEEE 802.15.3c-2009, antiphishing, Phishgig, WiTricity, wireless power, MIT, Living Wall, conductive paint, sensors, phishing, wireless personal area networks, WPANs
33Anthony Y. Fu, Liu Wenyin, Xiaotie Deng Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Antiphishing, visual assessment, Earth Mover's Distance
30Andrew J. Kalafut, Minaxi Gupta, Christopher A. Cole, Lei Chen, Nathan E. Myers An empirical study of orphan DNS servers in the internet. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #13 of 13 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license