Cited By
View all- Huang CHao SInvernizzi LLiu JFang YKruegel CVigna GKarri RSinanoglu OSadeghi AYi X(2017)GossipProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053017(494-505)Online publication date: 2-Apr-2017
- Aleroud AZhou L(2017)Phishing environments, techniques, and countermeasuresComputers and Security10.1016/j.cose.2017.04.00668:C(160-196)Online publication date: 1-Jul-2017
- Han XKheir NBalzarotti DWeippl EKatzenbeisser SKruegel CMyers AHalevi S(2016)PhishEyeProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978330(1402-1413)Online publication date: 24-Oct-2016
- Show More Cited By