Spot the phish by checking the pruned URL

Melanie Volkamer, Karen Renaud, Paul Gerber
  • Information and Computer Security, October 2016, Emerald
  • DOI: 10.1108/ics-07-2015-0032

The authors haven't finished explaining this publication. If you are the author, sign in to claim or explain your work.

Read Publication

http://dx.doi.org/10.1108/ics-07-2015-0032

The following have contributed to this page: Dr Karen Renaud

In partnership with: