These are the sources and citations used to research Dissertation. This bibliography was generated on Cite This For Me on

  • Report

    Orhan, F.

    PHISHING GOT DARKER. AND SMARTER.

    2018 - Comodo Threat Intelligence Lab - Clifton,New Jersey, United states

    In-text: (Orhan, 2018)

    Your Bibliography: Orhan, F., 2018. PHISHING GOT DARKER. AND SMARTER.. [online] Clifton,New Jersey, United states: Comodo Threat Intelligence Lab. Available at: <https://www.comodo.com/lab/pdf/phishing-got-darker-and-smarter.pdf> [Accessed 2 July 2018].

  • Website

    Regan, J.

    What is phishing? Avoid phishing emails, scams & attacks

    2018

    In-text: (Regan, 2018)

    Your Bibliography: Regan, J., 2018. What is phishing? Avoid phishing emails, scams & attacks. [online] Avg.com. Available at: <https://www.avg.com/en/signal/what-is-phishing> [Accessed 2 July 2018].

  • Journal

    Senturk, S., Yerli, E. and Sogukpinar, I.

    Email phishing detection and prevention by using data mining techniques

    2017 - 2017 International Conference on Computer Science and Engineering (UBMK)

    In-text: (Senturk, Yerli and Sogukpinar, 2017)

    Your Bibliography: Senturk, S., Yerli, E. and Sogukpinar, I., 2017. Email phishing detection and prevention by using data mining techniques. 2017 International Conference on Computer Science and Engineering (UBMK),.

  • Journal

    Sharma, H., Meenakshi, E. and Bhatia, S. K.

    A comparative analysis and awareness survey of phishing detection tools

    2017 - 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)

    In-text: (Sharma, Meenakshi and Bhatia, 2017)

    Your Bibliography: Sharma, H., Meenakshi, E. and Bhatia, S., 2017. A comparative analysis and awareness survey of phishing detection tools. 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT),.

  • Journal

    Waziri, I.

    Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures

    2015 - 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing

    In-text: (Waziri, 2015)

    Your Bibliography: Waziri, I., 2015. Website Forgery: Understanding Phishing Attacks and Nontechnical Countermeasures. 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing,.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join