Abstract | ||
---|---|---|
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confidential information. Most phishing emails aim at withdrawing money from financial ... |
Year | DOI | Venue |
---|---|---|
2010 | 10.3233/JCS-2010-0376 | Journal of Computer Security |
Keywords | Field | DocType |
multi-tenant virtual data center,confidential information,phishing emails,towards automated security policy,data center,security policy,trusted computing,virtualization | Virtualization,Trusted Network Connect,Research center,IBM,Trusted Computing,Computer security,Computer science,Policy enforcement,Watson,Operating system | Journal |
Volume | Issue | ISSN |
18 | 1 | 0926-227X |
Citations | PageRank | References |
16 | 0.87 | 18 |
Authors | ||
9 |
Name | Order | Citations | PageRank |
---|---|---|---|
Serdar Cabuk | 1 | 285 | 13.55 |
Chris I. Dalton | 2 | 143 | 15.21 |
Konrad Eriksson | 3 | 77 | 4.83 |
Dirk Kuhlmann | 4 | 61 | 4.84 |
Harigovind V. Ramasamy | 5 | 181 | 16.24 |
Gianluca Ramunno | 6 | 101 | 9.03 |
Ahmad-reza Sadeghi | 7 | 5463 | 334.69 |
Matthias Schunter | 8 | 941 | 91.12 |
Christian Stüble | 9 | 318 | 29.52 |