Cited By
View all- NAKANO HCHIBA DKOIDE TFUKUSHI NYAGI THARIU TYOSHIOKA KMATSUMOTO T(2024)Understanding Characteristics of Phishing Reports from Experts and Non-Experts on TwitterIEICE Transactions on Information and Systems10.1587/transinf.2023EDP7221E107.D:7(807-824)Online publication date: 1-Jul-2024
- Yang ZAllen JLanden MPerdisci RLee WCalandrino JTroncoso C(2023)TRIDENTProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620612(6701-6718)Online publication date: 9-Aug-2023
- Kotzias PRoundy KPachilakis MSanchez-Rola IBilge L(2023)Scamdog Millionaire: Detecting E-commerce Scams in the WildProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627184(29-43)Online publication date: 4-Dec-2023
- Show More Cited By