{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:51:07Z","timestamp":1730271067610,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/is.2018.8710514","type":"proceedings-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T21:58:26Z","timestamp":1557439106000},"page":"515-520","source":"Crossref","is-referenced-by-count":0,"title":["A Methodology for Assessing the Resilience Against Email Phishing"],"prefix":"10.1109","author":[{"given":"Joao Paulo","family":"Magalhaes","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.jisa.2014.09.005"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2523514.2523596"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/IAW.2006.1652125"},{"key":"ref13","article-title":"Securing information assets: understanding, measuring and protecting against social engineering attacks","author":"nohlberg","year":"2008","journal-title":"Ph D Dissertation"},{"year":"0","author":"martin","article-title":"Cyber kill chain","key":"ref14"},{"key":"ref15","article-title":"Detecting and preventing attacks ear- lier in the kill chain","author":"velazquez","year":"2015","journal-title":"SANS Institute Tech Rep"},{"key":"ref16","first-page":"1485","article-title":"Socialengineeringtoolkit&#x2014;asystematic approach to social engineering","author":"pavkovi?","year":"2011","journal-title":"MIPRO 2011 Proceedings of the 34th International Convention IEEE"},{"year":"2017","author":"wright","article-title":"Gophish: Open-source phishing toolkit","key":"ref17"},{"year":"2017","author":"mccann","article-title":"Phishing frenzy","key":"ref18"},{"key":"ref19","article-title":"Sender policy framework (spf) authentica- tion failure reporting using the abuse reporting format","author":"kitterman","year":"2012","journal-title":"Tech Rep"},{"key":"ref4","article-title":"Internet security threat report","volume":"21","year":"2016","journal-title":"ISTR"},{"year":"2018","article-title":"Top 12 cyber crime facts and statistics","key":"ref3"},{"year":"2017","article-title":"Business e-mail compromise, e-mail account compromise, the 5 billion dollar scam","key":"ref6"},{"year":"2016","article-title":"2016 data breach investigations report","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISSA.2014.6950510"},{"year":"2018","article-title":"Business email compromise (bee) attack trends report","key":"ref7"},{"year":"2018","article-title":"2018 cybersecurity landscape","key":"ref2"},{"year":"2017","author":"commission","article-title":"The EU ICT sector and its R&D performance","key":"ref1"},{"year":"2011","author":"mitnick","journal-title":"The Art of Deception Controlling the Human Element of Security","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.17487\/rfc5585"}],"event":{"name":"2018 International Conference on Intelligent Systems (IS)","start":{"date-parts":[[2018,9,25]]},"location":"Funchal - Madeira, Portugal","end":{"date-parts":[[2018,9,27]]}},"container-title":["2018 International Conference on Intelligent Systems (IS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8703185\/8710451\/08710514.pdf?arnumber=8710514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T23:32:41Z","timestamp":1558999961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8710514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/is.2018.8710514","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}