Found: 20
Select item for more details and to access through your institution.
Optimal feature-level fusion and layered k-support vector machine for spoofing face detection.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 20, p. 26509, doi. 10.1007/s11042-018-5877-9
- By:
- Publication type:
- Article
CYBER SECURITY IN EDUCATIONAL INSTITUTIONS.
- Published in:
- Journal of Natural Sciences & Mathematics (JNSM), 2023, v. 8, n. 15/16, p. 307
- By:
- Publication type:
- Article
Extinguishing the Firewall: Addressing the Jurisdictional Challenges to Bringing Cyber Tort Suits Against Foreign Sovereigns.
- Published in:
- Vanderbilt Law Review, 2019, v. 72, n. 1, p. 391
- By:
- Publication type:
- Article
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach.
- Published in:
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 245, doi. 10.3390/jcp2020013
- By:
- Publication type:
- Article
How to Minimize the Risk of Becoming a Victim of Wire Fraud.
- Published in:
- Brief, 2017, v. 46, n. 4, p. 63
- By:
- Publication type:
- Article
SMISHING ATTACKS AND THE HUMAN ELEMENT.
- Published in:
- Bench & Bar of Minnesota, 2022, v. 79, n. 4, p. 12
- By:
- Publication type:
- Article
Receiving Digital Documents (Part II).
- Published in:
- College & University, 2021, v. 96, n. 3, p. 51
- By:
- Publication type:
- Article
Defending Against Phishing: Case Studies.
- Published in:
- 2017
- By:
- Publication type:
- Case Study
A Comparative Analysis of Anti-Phishing Mechanisms: Email Phishing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 567
- By:
- Publication type:
- Article
The King of the CASL: CANADA'S ANTI-SPAM LAW INVADES THE UNITED STATES.
- Published in:
- Brooklyn Law Review, 2019, v. 84, n. 4, p. 1321
- By:
- Publication type:
- Article
Stop Delivery of Phishing Emails.
- Published in:
- ISSA Journal, 2016, v. 14, n. 7, p. 41
- By:
- Publication type:
- Article
Country in Focus: Ten Years after the Estonian Cyberattacks.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 67, doi. 10.1353/gia.2017.0038
- By:
- Publication type:
- Article
Sentence Level Analysis Model for Phishing Detection Using KNN.
- Published in:
- Journal of Cybersecurity (2579-0072), 2024, v. 6, p. 25, doi. 10.32604/jcs.2023.045859
- By:
- Publication type:
- Article
A New Approach in Cyber Security of Industrial Control Systems: Li-Fi.
- Published in:
- Journal of Polytechnic, 2022, v. 25, n. 2, p. 895, doi. 10.2339/politeknik.976886
- By:
- Publication type:
- Article
CyberCentral 2017.
- Published in:
- 2017
- By:
- Publication type:
- Proceeding
PHISHING OUR CLIENTS: A STEP TOWARD IMPROVING TRAINING VIA SOCIAL ENGINEERING.
- Published in:
- Issues in Information Systems, 2016, v. 17, n. 1, p. 231
- By:
- Publication type:
- Article
Impact Analysis of Resilience Against Malicious Code Attacks via Emails.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 3, p. 4803, doi. 10.32604/cmc.2022.025310
- By:
- Publication type:
- Article
Inventorying Data Is the First Step in Protection.
- Published in:
- Journal of Government Financial Management, 2017, v. 66, n. 3, p. 61
- By:
- Publication type:
- Article
THE LACK OF RESPONSIBILITY OF HIGHER EDUCATION INSTITUTIONS IN ADDRESSING PHISHING EMAILS AND DATA BREACHES.
- Published in:
- Duke Law & Technology Review, 2023, v. 23, n. 1, p. 35
- By:
- Publication type:
- Article
FOREWORD.
- Published in:
- Journal of International Affairs, 2018, v. 71, p. 9
- By:
- Publication type:
- Article