Login / Signup
Phishing attempts among the dark triad: Patterns of attack and vulnerability.
Shelby R. Curtis
Prashanth Rajivan
Daniel N. Jones
Cleotilde Gonzalez
Published in:
Comput. Hum. Behav. (2018)
Keyphrases
</>
phishing attacks
countermeasures
security risks
email
attack graphs
pattern mining
secret key
similar patterns
frequent patterns
malicious activities
penetration testing
association rules
information security
design patterns
spam filtering
security vulnerabilities
service providers