Works matching DE "PHISHING prevention"
1
- Government Technology, 2018, v. 31, n. 7, p. 46
- Article
2
- Journal of Telecommunications & the Digital Economy, 2024, v. 12, n. 1, p. 446, doi. 10.18080/jtde.v12n1.822
- Bouijij, Habiba;
- Berqia, Amine
- Article
3
- Journal of Medical Internet Research, 2021, v. 23, n. 4, p. N.PAG, doi. 10.2196/21747
- He, Ying;
- Aliyu, Aliyu;
- Evans, Mark;
- Luo, Cunjin
- Article
4
- 2021
- He, Ying;
- Aliyu, Aliyu;
- Evans, Mark;
- Luo, Cunjin
- journal article
5
- New Perspectives on Healthcare Risk Management, Control & Governance, 2021, v. 40, n. 1, p. 26
- Article
6
- Information (2078-2489), 2024, v. 15, n. 10, p. 643, doi. 10.3390/info15100643
- Mutlutürk, Meltem;
- Wynn, Martin;
- Metin, Bilgin
- Article
7
- Information (2078-2489), 2021, v. 12, n. 5, p. 208, doi. 10.3390/info12050208
- Alsulami, Majid H.;
- Alharbi, Fawaz D.;
- Almutairi, Hamdan M.;
- Almutairi, Bandar S.;
- Alotaibi, Mohammed M.;
- Alanzi, Majdi E.;
- Alotaibi, Khaled G.;
- Alharthi, Sultan S.;
- Zubiaga, Arkaitz
- Article
8
- Information (2078-2489), 2020, v. 11, n. 12, p. 547, doi. 10.3390/info11120547
- Aljeaid, Dania;
- Alzhrani, Amal;
- Alrougi, Mona;
- Almalki, Oroob
- Article
9
- Information (2078-2489), 2020, v. 11, n. 6, p. 309, doi. 10.3390/info11060309
- Ali, Guma;
- Ally Dida, Mussa;
- Elikana Sam, Anael
- Article
10
- IEEE Internet Computing, 2011, v. 15, n. 3, p. 43, doi. 10.1109/MIC.2010.103
- Atighetchi, Michael;
- Benyo, Brett;
- Gosain, Abhimanyu;
- MacIntyre, Robert;
- Pal, Partha;
- Travers, Virginia;
- Zinky, John
- Article
11
- ComputerWorld Hong Kong, 2017, p. 38
- Article
12
- Webology, 2020, v. 17, n. 2, p. 524, doi. 10.14704/WEB/V17I2/WEB17049
- Rahim, Robbi;
- Murugan, S.;
- Mostafa, Reham R.;
- Dubey, Anil Kumar;
- Regin, R.;
- Kulkarni, Vikram;
- Dhanalakshmi, K. S.
- Article
13
- Inteligencia Artificial: Revista Iberoamericana de Inteligencia Artificial, 2022, v. 24, n. 69, p. 107, doi. 10.4114/intartif.vol25iss69pp107-121
- Martin Lamas Piñeiro, Javier Julio;
- Wong Portillo, Lenis R.
- Article
14
- Bench & Bar of Minnesota, 2020, v. 77, n. 8, p. 8
- Article
15
- Fusion: Practice & Applications, 2023, v. 12, n. 2, p. 159, doi. 10.54216/FPA.120213
- Article
16
- Journal of Applied Science & Technology Trends (JASTT), 2023, v. 4, n. 1, p. 54, doi. 10.38094/jastt401144
- Abdulrahman, Lozan Mohammed;
- Ahmed, Sarkar Hasan;
- Rashid, Zryan Najat;
- Jghef, Yousif Sufyan;
- Sami, Teba Mohammed Ghazi;
- Jader, Umed H.
- Article
17
- Journal of Management Information Systems, 2020, v. 37, n. 1, p. 129, doi. 10.1080/07421222.2019.1705512
- Silic, Mario;
- Lowry, Paul Benjamin
- Article
18
- Journal of Management Information Systems, 2017, v. 34, n. 2, p. 597, doi. 10.1080/07421222.2017.1334499
- Jensen, Matthew L.;
- Dinger, Michael;
- Wright, Ryan T.;
- Thatcher, Jason Bennett
- Article
19
- Journal of Management Information Systems, 2017, v. 34, n. 2, p. 307, doi. 10.1080/07421222.2017.1334463
- Article
20
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- Martin, Jason;
- Rajan, Anand;
- Steigerwald, Bob
- Article
21
- Complex & Intelligent Systems, 2023, v. 9, n. 6, p. 7269, doi. 10.1007/s40747-023-01118-z
- Bacanin, Nebojsa;
- Zivkovic, Miodrag;
- Antonijevic, Milos;
- Venkatachalam, K.;
- Lee, Jinseok;
- Nam, Yunyoung;
- Marjanovic, Marina;
- Strumberger, Ivana;
- Abouhawwash, Mohamed
- Article
22
- Journal of Information Technology (Sage Publications Inc.), 2020, v. 35, n. 3, p. 214, doi. 10.1177/0268396220918594
- Pienta, Daniel;
- Thatcher, Jason Bennett;
- Johnston, Allen
- Article
23
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 792, doi. 10.26483/ijarcs.v9i1.5471
- Kordestani, Hossain;
- Shajari, Mehdi
- Article
24
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 270, doi. 10.26483/ijarcs.v9i1.5200
- Sumathi, K.;
- Damodaram, Radha
- Article
25
- 2017
- Sankhwar, Shweta;
- Pandey, Dhirendra
- Case Study
26
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 584
- Narayana Rao, T. Venkat;
- Reddy, Karnati Yashwanth;
- Kumar, Ganji Dinesh
- Article
27
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 567
- Sankhwar, Shweta;
- Pandey, Dhirendra
- Article
28
- Journal of Information System Security, 2024, v. 20, n. 3, p. 147
- Article
29
- International Management Review, 2018, v. 14, n. 2, p. 5
- Article
30
- Multimedia Tools & Applications, 2023, v. 82, n. 19, p. 29431, doi. 10.1007/s11042-023-14731-4
- Jha, Ashish Kumar;
- Muthalagu, Raja;
- Pawar, Pranav M.
- Article
31
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 5, p. 324, doi. 10.1049/ise2.12073
- Al‐Qahtani, Ali F.;
- Cresci, Stefano
- Article
32
- MIS Quarterly, 2010, v. 34, n. 3, p. 435, doi. 10.2307/25750686
- Abbasi, Ahmed;
- Zhang, Zhu;
- Zimbra, David;
- Chen, Hsinchun;
- Nunamaker, Jr., Jay F.
- Article
33
- African Journal of Information Systems, 2019, v. 11, n. 3, p. 157
- Musuva, Paula M. W.;
- Chepken, Christopher K.;
- Getao, Katherine W.
- Article
34
- Information Systems Journal, 2021, v. 31, n. 3, p. 429, doi. 10.1111/isj.12317
- Jaeger, Lennart;
- Eckhardt, Andreas
- Article
35
- Telecommunication Systems, 2018, v. 68, n. 4, p. 687, doi. 10.1007/s11235-017-0414-0
- Jain, Ankit Kumar;
- Gupta, B. B.
- Article
36
- Telecommunication Systems, 2018, v. 67, n. 2, p. 247, doi. 10.1007/s11235-017-0334-z
- Gupta, B. B.;
- Arachchilage, Nalin A. G.;
- Psannis, Kostas E.
- Article
37
- Computers, Materials & Continua, 2018, v. 57, n. 3, p. 533, doi. 10.32604/cmc.2018.03720
- Guoyuan Lin;
- Bowen Liu;
- Pengcheng Xiao;
- Min Lei;
- Wei Bi
- Article
38
- University of Cincinnati Law Review, 2016, v. 84, n. 4, p. 1069
- Article
39
- International Journal of Cyber Criminology, 2018, p. 333, doi. 10.5281/zenodo.1467935
- Ming-Li Hsieh;
- Shun-Yung Kevin Wang
- Article
40
- International Journal of Navigation & Observation, 2012, p. 1, doi. 10.1155/2012/501679
- Nielsen, J.;
- Dehghanian, V.;
- Lachapelle, G.
- Article
41
- Current Science (00113891), 2017, v. 112, n. 12, p. 2361
- Article
42
- Iraqi Journal of Science, 2023, v. 64, n. 10, p. 5376, doi. 10.24996/ijs.2023.64.10.41
- Mahmood, Ameen R.;
- Hameed, Sarab M.
- Article
43
- ISACA Journal, 2025, n. 1, p. 6
- Article
44
- ISACA Journal, 2024, n. 4, p. 24
- Article
45
- Wireless Networks (10220038), 2013, v. 19, n. 8, p. 1839, doi. 10.1007/s11276-013-0577-x
- Chiou, Shin-Yan;
- Huang, Yao-Hsien
- Article
46
- Journal of Circuits, Systems & Computers, 2024, v. 33, n. 2, p. 1, doi. 10.1142/S0218126624500312
- Gundla, Sri Charan;
- Karthik, M. Praveen;
- Reddy, Middi Jashwanth Kumar;
- Gourav;
- Pankaj, Ashutosh;
- Stamenkovic, Z.;
- Raja, S. P.
- Article
47
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2020, v. 45, n. 4, p. 3171, doi. 10.1007/s13369-019-04319-2
- Humayun, Mamoona;
- Niazi, Mahmood;
- Jhanjhi, NZ;
- Alshayeb, Mohammad;
- Mahmood, Sajjad
- Article
48
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59
- Kuan-Ta Chen;
- Chun-Rong Huang;
- Chu-Song Chen;
- Jau-Yuan Chen
- Article
49
- Journal of the Missouri Bar, 2018, v. 74, n. 3, p. 153
- Article
50
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/7058972
- Yang, Rundong;
- Zheng, Kangfeng;
- Wu, Bin;
- Li, Di;
- Wang, Zhe;
- Wang, Xiujuan
- Article