Author of the publication

A phishing Mitigation Solution using Human Behaviour and Emotions that Influence the Success of Phishing Attacks.

, , , and . UMAP (Adjunct Publication), page 345-350. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phishing Attacks Root Causes., , , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 187-202. Springer, (2017)A phishing Mitigation Solution using Human Behaviour and Emotions that Influence the Success of Phishing Attacks., , , and . UMAP (Adjunct Publication), page 345-350. ACM, (2021)On the use of gradients in kriging surrogate models., , , , and . WSC, page 2692-2701. IEEE/ACM, (2014)Evolutionary Regression Modeling with Active Learning: An Application to Rainfall Runoff Modeling., , , , and . ICANNGA, volume 5495 of Lecture Notes in Computer Science, page 548-558. Springer, (2009)Pareto-Based Multi-output Metamodeling with Active Learning., , , and . EANN, volume 43 of Communications in Computer and Information Science, page 389-400. (2009)A hybrid sequential sampling based metamodelling approach for high dimensional problems., , , , and . CEC, page 1917-1923. IEEE, (2016)Design and Implementation of a Secure Media Content Delivery Broker Architecture., , , , , , and . ISWS, page 3-9. CSREA Press, (2005)Pseudo-3D RSSI-based WSN localization algorithm using linear regression., , , , and . Wirel. Commun. Mob. Comput., 15 (9): 1342-1354 (2015)A Matlab Toolbox for Kriging Metamodelling., , , , and . ICCS, volume 51 of Procedia Computer Science, page 2708-2713. Elsevier, (2015)A linear regression based cost function for WSN localization., , , , and . SoftCOM, page 1-5. IEEE, (2011)