Cited By
View all- Issa AMurray TErnst GBuchanan GStevenson D(2018)In search of perfect usersProceedings of the 30th Australian Conference on Computer-Human Interaction10.1145/3292147.3292231(572-576)Online publication date: 4-Dec-2018
- Li LBerki EHelenius MOvaska S(2014)Towards a contingency approach with whitelist-and blacklist-based anti-phishing applicationsBehaviour & Information Technology10.1080/0144929X.2013.87522133:11(1136-1147)Online publication date: 1-Nov-2014
- Li LHelenius MBerki ELugmayr A(2012)A usability test of whitelist and blacklist-based anti-phishing applicationProceeding of the 16th International Academic MindTrek Conference10.1145/2393132.2393170(195-202)Online publication date: 3-Oct-2012