http://researchonline.federation.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 The seven scam types: Mapping the terrain of cybercrime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3844 Wed 07 Apr 2021 13:34:54 AEST ]]> The effectiveness of using static features in identifying scam genres http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3700 Wed 07 Apr 2021 13:34:43 AEST ]]> Why do users trust the wrong messages? A behavioural model of phishing http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2311 Wed 07 Apr 2021 13:33:23 AEST ]]> The case for a consistent cyberscam classification framework (CCCF) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2308 Wed 07 Apr 2021 13:33:22 AEST ]]> Determining provenance in phishing websites using automated conceptual analysis http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2304 Wed 07 Apr 2021 13:33:22 AEST ]]> Using differencing to increase distinctiveness for phishing website clustering http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2303 Wed 07 Apr 2021 13:33:22 AEST ]]>