Proceedings of the 15th International Conference on Availability, Reliability and Security 2020
DOI: 10.1145/3407023.3409205
|View full text |Cite
|
Sign up to set email alerts
|

Generalizing the phishing principle

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…However, they discovered that the method by which the attack is delivered to the victim matters and can significantly increase up to three times the effect of the base attack. Sykosch et al (2020) introduced a framework that captures user responses to artefacts like phishing tests. They performed user behaviour analysis in response to controlled stimuli for IT security awareness assessment stimuli is something causing or regarded as causing a reply.…”
Section: Url/ Linkmentioning
confidence: 99%
“…However, they discovered that the method by which the attack is delivered to the victim matters and can significantly increase up to three times the effect of the base attack. Sykosch et al (2020) introduced a framework that captures user responses to artefacts like phishing tests. They performed user behaviour analysis in response to controlled stimuli for IT security awareness assessment stimuli is something causing or regarded as causing a reply.…”
Section: Url/ Linkmentioning
confidence: 99%