An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection, 2009 Sixth International Conference on Information Technology: New Generations, pp.405-410, 2009. ,
DOI : 10.1109/ITNG.2009.109
Global Phishing Survey: Trends and Domain Name Use in 2H2013, 2013. ,
Do not crawl in the DUST, ACM Transactions on the Web, vol.3, issue.1, pp.1-31, 2009. ,
DOI : 10.1145/1462148.1462151
F for fake, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.3469-3478, 2011. ,
DOI : 10.1145/1978942.1979459
NoPhish: An Anti-Phishing Education App, Security and Trust Management, pp.188-192, 2014. ,
DOI : 10.1007/978-3-319-11851-2_14
Learn to Spot Phishing URLs with the Android NoPhish App, Information Security Education Across the Curriculum, pp.87-100, 2015. ,
DOI : 10.1007/978-3-319-18500-2_8
URL : https://hal.archives-ouvertes.fr/hal-01334293
NoPhish App Evaluation: Lab and Retention Study, Proceedings 2015 Workshop on Usable Security, 2015. ,
DOI : 10.14722/usec.2015.23009
Low-ball procedure for producing compliance: Commitment then cost., Journal of Personality and Social Psychology, vol.36, issue.5, p.463, 1978. ,
DOI : 10.1037/0022-3514.36.5.463
Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.581-590, 2006. ,
DOI : 10.1145/1124772.1124861
Phishing for user security awareness, Computers & Security, vol.26, issue.1, pp.73-80, 2007. ,
DOI : 10.1016/j.cose.2006.10.009
Why we fall for phishing, Conference on Human Factors in Computer Systems. ACM, 2011. ,
Learning to detect phishing emails, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.649-656, 2007. ,
DOI : 10.1145/1242572.1242660
Phishing: How an Organization can Protect Itself, Information Security South Africa Conference, pp.253-268, 2009. ,
Users' conceptions of web security, CHI '02 extended abstracts on Human factors in computing systems , CHI '02, pp.746-747, 2002. ,
DOI : 10.1145/506443.506577
A framework for detection and measurement of phishing attacks, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.1-8, 2007. ,
DOI : 10.1145/1314389.1314391
Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007. ,
DOI : 10.1145/1290958.1290968
What Instills Trust? A Qualitative Study of Phishing, FC, pp.356-361, 2007. ,
DOI : 10.1007/978-3-540-77366-5_32
Simulating malicious emails to educate end users on-demand, 2011 3rd Symposium on Web Society, pp.74-80, 2011. ,
DOI : 10.1109/SWS.2011.6101274
Phishing Detection: A Literature Survey, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2091-2121, 2013. ,
DOI : 10.1109/SURV.2013.032213.00009
Security Education against Phishing: A Modest Proposal for a Major Rethink, IEEE Security & Privacy Magazine, vol.10, issue.2, pp.24-32, 2012. ,
DOI : 10.1109/MSP.2011.179
Protecting people from phishing, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.905-914, 2007. ,
DOI : 10.1145/1240624.1240760
Getting users to pay attention to anti-phishing education, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.70-81, 2007. ,
DOI : 10.1145/1299015.1299022
Teaching Johnny not to fall for phish, ACM Transactions on Internet Technology, vol.10, issue.2, pp.1-7, 2010. ,
DOI : 10.1145/1754393.1754396
Usability evaluation of anti-phishing toolbars, Journal in Computer Virology, vol.3, issue.4, pp.163-184, 2007. ,
DOI : 10.1007/s11416-007-0050-4
Does domain highlighting help people identify phishing sites? In CHI, pp.2075-2084, 2011. ,
Beyond blacklists, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.1245-1254, 2009. ,
DOI : 10.1145/1557019.1557153
Proactive Discovery of Phishing Related Domain Names, Attacks, Intrusions, and Defenses, pp.190-209, 2012. ,
DOI : 10.1007/978-3-642-33338-5_10
URL : https://hal.archives-ouvertes.fr/hal-00748808
Using visual website similarity for phishing detection and reporting, Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, CHI EA '12, pp.1625-1630, 2012. ,
DOI : 10.1145/2212776.2223683
Using data type based security alert dialogs to raise online security awareness, Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, 2011. ,
DOI : 10.1145/2078827.2078830
Analysing Urgency and Trust Cues Exploited in Phishing Scam Designs, 10th International Conference on Cyber Warfare and Security Academic Conferences Limited, p.216, 2015. ,
PhishNet: Predictive Blacklisting to Detect Phishing Attacks, 2010 Proceedings IEEE INFOCOM, pp.1-5, 2010. ,
DOI : 10.1109/INFCOM.2010.5462216
The " social engineering " of Internet fraud, Internet Society Annual Conference. Internet Society, 1999. ,
Anti-Phishing Phil, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.88-99, 2007. ,
DOI : 10.1145/1280680.1280692
Understanding scam victims, Communications of the ACM, vol.54, issue.3, pp.70-75, 2011. ,
DOI : 10.1145/1897852.1897872
Detecting Phishing Emails the Natural Language Way, ESORICS, pp.824-841, 2012. ,
DOI : 10.1007/978-3-642-33167-1_47
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model, Decision Support Systems, vol.51, issue.3, pp.576-586, 2011. ,
DOI : 10.1016/j.dss.2011.03.002
An empirical exploration of the design pattern of phishing attacks, Inform. Assurance, 2009. ,
Webroot 2015 Threat Brief, 2016. ,
Do security toolbars actually prevent phishing attacks? In CHI, pp.601-610, 2006. ,
Victimized by Phishing: A Heuristic-Systematic Perspective, ARRAY Development, 2012. ,
Phinding Phish: Evaluating Anti-Phishing Tools, In NDSS. School of Computer Science, 2007. ,