Automated phishing-email training

作者: Jamison W. Scheeres

DOI:

关键词:

摘要: A computing platform may generate a message comprising instructions for handling phishing emails. The communicate the emails to user device. training email content. content determine whether has been handled in accordance with generate, based on emails, new different

参考文章(31)
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong, Jason Brubaker, Method and system for controlling context-aware cybersecurity training ,(2014)
Todd Keith Inskeep, David C. Shroyer, Scott Chapman Huie, Lorettajean C. Maguire, David C. King, Jason Andrew Malo, Phishing redirect for consumer education: fraud detection ,(2007)
Norman Sadeh-Koniecpol, Kurt Wescoe, Jason Hong, Jason Brubaker, Context-aware training systems, apparatuses, and methods ,(2012)
Joel Alan Vickery, Christopher Dyson White, Chester Randolph Ratcliffe, Aaron Randal Moate, Marc Anthony Crawford, Ronald David Parker, John Christian Espinosa, Systems and methods for a simulated network attack generator ,(2009)
Christopher Soghoian, Kelly Caine, Anti-phishing system and method ,(2012)
Patrick Kelley, Paul Hankes Drielsma, Norman Sadeh-Koniecpol, Lorrie Faith Candor, User-controllable learning of policies ,(2009)
Kay Myers, Mark Brian Bell, Brian Whyte, Scott Cruickshanks Kennedy, Royse Ayers Ii Carleton, Computer network defense ,(2012)