Suggested Topics within your search.
Suggested Topics within your search.
Electronic mail
Data mining
2
All or nothings
1
Association rule mining methods
1
Association rules
1
Brute-force attack
1
Communication systems
1
Computer crime
1
Cryptography
1
Cyber security
1
Cybersecurity
1
Cybersecurity training
1
Data mining methods
1
Explainable semantic communications
1
Eye tracking
1
Feature extraction
1
Finance
1
Financial service
1
Games-based training
1
Gender differences
1
ISAT
1
Information security
1
Information security awareness
1
Information security awareness training
1
Information theory
1
Information- theoretic securities
1
Internet users
1
Perfect securities
1
Phishing
1
Pre-processing techniques
1
-
1
-
2
-
3
-
4by Al-Dhahir, N., Gao, D., Li, H., Li, S., Ma, S., Qiao, W., Shi, G., Shi, Y., Wu, Y.View Fulltext in Publisher
Published 2023
View in Scopus
Article