2013
DOI: 10.1016/j.asoc.2011.06.016
|View full text |Cite
|
Sign up to set email alerts
|

Obtaining the threat model for e-mail phishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
7

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 16 publications
0
10
0
7
Order By: Relevance
“…25 We refer to [90] where the authors built a dataset with emails from Wikileaks archives and Phishbowls from different universities. [167], [177], [179], [180] [162], [163], [165], [166], [171], [184] [161], [188]- [190], [192], [196], [197] [168]- [170], [173], [178], [186], [195] [176], [181]…”
Section: Dataset Properties 1) Dataset Sources and Availabilitymentioning
confidence: 99%
“…25 We refer to [90] where the authors built a dataset with emails from Wikileaks archives and Phishbowls from different universities. [167], [177], [179], [180] [162], [163], [165], [166], [171], [184] [161], [188]- [190], [192], [196], [197] [168]- [170], [173], [178], [186], [195] [176], [181]…”
Section: Dataset Properties 1) Dataset Sources and Availabilitymentioning
confidence: 99%
“…According to Olivoa et al [12], a threat model is a feature set of the attacker's strategy. In theory, a threat model should describe the capabilities of the attacker as well as identify the threats, based on the anticipated security requirements [13].…”
Section: Threat Modelmentioning
confidence: 99%
“…Cleber K.Olivo et al [16] offered a pitch to ascertain the neededskins, which delineate the threat archetypal; email phishing assailantstratagem. Threat model vetoed the use of inaptskins in the recognition engine and ensuingsway on its efficacy.…”
Section: Literature Analysismentioning
confidence: 99%