9
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Article: not found

          Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Decision strategies and susceptibility to phishing

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              A framework for detection and measurement of phishing attacks

                Bookmark

                Author and article information

                Journal
                IEEE Transactions on Vehicular Technology
                IEEE Trans. Veh. Technol.
                Institute of Electrical and Electronics Engineers (IEEE)
                0018-9545
                1939-9359
                August 2016
                August 2016
                : 65
                : 8
                : 6678-6691
                Article
                10.1109/TVT.2015.2472993
                da1fc62e-4d0d-4ab7-bacd-333198540c3d
                © 2016
                History

                Comments

                Comment on this article