Login / Signup
Not All Victims Are Created Equal: Investigating Differential Phishing Susceptibility.
Matthew Canham
Shaneé Dawkins
Jody L. Jacobs
Published in:
HCI (11) (2024)
Keyphrases
</>
email
computer vision
case study
database systems
fraud detection
countermeasures
spam filtering
identity theft
phishing attacks
data sets
genetic algorithm
expert systems
personal information
phishing emails