The Phish in the Pond: Scam emails as literature (also invited as book chapter) (2010)
Attributed to:
Defending the Weakest Link: Intrusion via Social Engineering
funded by
EPSRC
Abstract
No abstract provided
Bibliographic Information
Type: Technical Report