Cited By
View all- Sarker OJayatilaka AHaggag SLiu CBabar M(2025)Understanding practitioners’ challenges and requirements in the design, implementation, and evaluation of anti-phishing interventionsJournal of Systems and Software10.1016/j.jss.2025.112356225(112356)Online publication date: Jul-2025
- Sheil ACamilleri JCronin MGruben MO'Keeffe MMurray HDas SFarzan RLópez CCardoso Llach DQuercia DMustafa MNiu SWong-Villacrés M(2024)Enhancing Personalised Cybersecurity Guidance for Older Adults in IrelandCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681894(478-484)Online publication date: 11-Nov-2024
- Das SKim DAbbott JCamp LFarzan RLópez CCardoso Llach DQuercia DMustafa MNiu SWong-Villacrés M(2024)User-Centered Phishing Detection through Personalized Edge ComputingCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681864(283-287)Online publication date: 11-Nov-2024
- Show More Cited By