Login / Signup
How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests.
Miriam E. Armstrong
Keith S. Jones
Akbar Siami Namin
Published in:
Hum. Factors (2023)
Keyphrases
</>
neural network
attitudes toward
malicious attacks
countermeasures
database
data mining
website
wireless sensor networks
watermarking scheme
computer security
image watermarking
user requests
positively correlated