Does the Anchoring Effect Influence Individuals’ Anti-phishing Behavior Intentions?

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Foundations and Practice of Security (16. : 2022 : Bordeaux) Foundations and practice of security ; Part 1
1. Verfasser: Sawaya, Yukiko (VerfasserIn)
Weitere Verfasser: Sano, Ayane (VerfasserIn), Isohara, Takamasa (VerfasserIn), Yamada, Akira (VerfasserIn), Komatsu, Ayako (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Securing Smart Vehicles Through Federated Learning 2024 Halim, Sadaf M. D.
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection 2024 Aurora, Victor
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures 2024 Besson, Pierre-Victor
Web Scams Detection System 2024 Badawi, Emad
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware 2024 Faghihi, Farnood
Original Entry Point Detection Based on Graph Similarity 2024 Pham, Thanh-Hung
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr 2024 Lucca, Serena
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm 2024 Wang, Ruize
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection 2024 Vitorino, João
Using Reed-Muller Codes for Classification with Rejection and Recovery 2024 Fentham, Daniel
Practices for Assessing the Security Level of Solidity Smart Contracts 2024 Mekkouri, Mohamed
IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets 2024 Dzeha, Eric Edem
Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study 2024 Ridley, Norah
Hardening Systems Against Data Corruption Attacks at Design Time 2024 Breton, John
A Small World–Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets 2024 Bar-on, Maxwel
Effectiveness of Binary-Level CFI Techniques 2024 Vaidya, Ruturaj K.
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes 2024 Zamani, Mahmoud
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports 2024 Bekhouche, Mohamed El Amine
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives 2024 Khoury, Raphaël
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code 2024 Cassagne, Julien
Alle Artikel auflisten