Login / Signup
Using Theories and Best Practices to Bridge the Phishing Gap.
Edwin Donald Frauenstein
Rossouw von Solms
Published in:
EISMC (2013)
Keyphrases
</>
email
theoretical framework
software engineering
spam filtering
fraud detection
design patterns
data sets
genetic algorithm
database systems
countermeasures
cognitive psychology
identity theft
phishing emails