Open Access
Issue
SHS Web Conf.
Volume 65, 2019
The 8th International Conference on Monitoring, Modeling & Management of Emergent Economy (M3E2 2019)
Article Number 03004
Number of page(s) 5
Section Management of the State’s Economic Safety and Economic Safety of Economic Agents
DOI https://doi.org/10.1051/shsconf/20196503004
Published online 29 May 2019
  1. OECD science, technology, and industry scoreboard:Towards a knowledge-based economy. Organisation for Economic Cooperation and Development. http://www.oecd.org/ (2019). Accessed 13 Mar 2019 [Google Scholar]
  2. Babenko, V., Syniavska, O.: Analysis of the current state of development of electronic commerce market in Ukraine. Tech. Aud. and Prod. Res. 5(4(43)), 40-45 (2018). doi:10.15587/2312-8372.2018.146341 [Google Scholar]
  3. Mia, A., Rahman, M., Uddin, M.: E-Banking:Evolution, Status and Prospects. Cost & Manag. 1(35), 36-48 (2007) [Google Scholar]
  4. Lastdrager, E.: Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Science. 3:9 (2014). doi:10.1186/s40163-014-0009-y [CrossRef] [Google Scholar]
  5. The Statistical Portal. https://www.statista.com/ (2019). Accessed 13 Mar 2019 [Google Scholar]
  6. Jakobsson, M., Myers, S. (ed.) Phishing and countermeasures: understanding the increasing problem of electronic identity theft. John Wiley & Sons, Inc. (2007) [Google Scholar]
  7. J. Shi, S. Saleem.: Phishing: Final Report. https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2014/Resources/presentations/2012/topic5- final/report.pdf (2012). Accessed 9 Mar 2019 [Google Scholar]
  8. Swanink, R.: Persistent effects of manin-the-middle attacks. Bachelor Thesis, Radboud University (2016) [Google Scholar]
  9. Damodaram, R.: Study on phishing attacks and antiphishing tools. IRJET. 3(1), 700-705 (2016) [Google Scholar]
  10. Alsayed, A., Bilgrami, A.: E-banking security:Internet hacking, phishing attacks, analysis and prevention of fraudulent activities. Int. J. Of Emerg. Techn. and Adv. Activ 7(1), 109-115 (2017) [Google Scholar]
  11. Delgado, O., Fuster-Sabater, A., Sierra, J.: Analysis of new threats to online banking authentication schemes. In: Proceedings of the X Spanish Meeting on Cryptology and Information Security (RECSI 2008), pp. 337-344 (2008) [Google Scholar]
  12. Hussein, S.: Predator-Prey Modeling. Undergraduate Journal of Mathematical Modeling: One + Two. 3(1), 20 (2010). doi:10.5038/2326-3652.3.1.32 [Google Scholar]
  13. Oliinyk, V., Wiebe, I., Syniavska O., Yatsenko, V.:Optimization model of Bass. JAES, 8(62), 2168-2183 (2018) [Google Scholar]
  14. Gupta, R.: Dynamics of a Holling-Tanner Model. AJER. 6(4), 132-140 (2017) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.