Author:
Sethuraman Sibi Chakkaravarthy,V S Devi Priya,Reddi Tarun,Reddy Mulka Sai Tharun,Khan Muhammad Khurram
Subject
Law,General Computer Science
Reference108 articles.
1. Spear phishing simulation in critical sector: telecommunication and defense sub-sector;Abdullah,2019
2. Phishing happens beyond technology: the effects of human behaviors and demographics on each step of a phishing process;Abroshan;IEEE Access,2021
3. Comparing DNS resolvers in the wild;Ager,2010
4. Demographic factors of cybersecurity awareness in Bangladesh;Ahmed,2019