Pretexting (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Pretexting" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
5th place
5th place
11th place
8th place
102nd place
76th place
274th place
309th place
652nd place
515th place
507th place
429th place
8,886th place
5,230th place
222nd place
297th place
149th place
178th place

doi.org

doi.org

dx.doi.org

handle.net

hdl.handle.net

ieee.org

ieeexplore.ieee.org

  • Greitzer, F. L.; Strozer, J. R.; Cohen, S.; Moore, A. P.; Mundie, D.; Cowley, J. (May 2014). "Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits". 2014 IEEE Security and Privacy Workshops. pp. 236–250. doi:10.1109/SPW.2014.39. ISBN 978-1-4799-5103-1. S2CID 15493684.
  • Greitzer, Frank L.; Strozer, Jeremy R.; Cohen, Sholom; Moore, Andrew P.; Mundie, David; Cowley, Jennifer (May 2014). "Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits". 2014 IEEE Security and Privacy Workshops. San Jose, CA: IEEE. pp. 236–250. doi:10.1109/SPW.2014.39. ISBN 978-1-4799-5103-1. S2CID 15493684.

sciencedirect.com

semanticscholar.org

api.semanticscholar.org

springer.com

link.springer.com

tandfonline.com

temple.edu

scholarshare.temple.edu

wiley.com

onlinelibrary.wiley.com

worldcat.org