Don’t click: towards an effective anti-phishing training. A comparative literature review View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2020-08-09

AUTHORS

Daniel Jampen, Gürkan Gür, Thomas Sutter, Bernhard Tellenbach

ABSTRACT

Email is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many organizations have begun to provide anti-phishing training programs to their employees. A central question in the development of such programs is how they can be designed sustainably and effectively to minimize the vulnerability of employees to phishing attacks. In this paper, we survey and categorize works that consider different elements of such programs via a clearly laid-out methodology, and identify key findings in the technical literature. Overall, we find that researchers agree on the answers to many relevant questions regarding the utility and effectiveness of anti-phishing training. However, we identified influencing factors, such as the impact of age on the success of anti-phishing training programs, for which mixed findings are available. Finally, based on our comprehensive analysis, we describe how a well-founded anti-phishing training program should be designed and parameterized with a set of proposed research directions. More... »

PAGES

33

References to SciGraph publications

  • 2017. Advanced Persistent Training, Take Your Security Awareness Program to the Next Level in NONE
  • 2009-07-16. Where Did They Go Right? Understanding the Deception in Phishing Communications in GROUP DECISION AND NEGOTIATION
  • 2019-08-23. Mouse Behavior as an Index of Phishing Awareness in HUMAN-COMPUTER INTERACTION – INTERACT 2019
  • 2013. Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails in SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS
  • 2016-03-17. Fighting against phishing attacks: state of the art and future challenges in NEURAL COMPUTING AND APPLICATIONS
  • 2019-07-20. Better beware: comparing metacognition for phishing and legitimate emails in METACOGNITION AND LEARNING
  • 2019-08-23. Social Engineering and Organisational Dependencies in Phishing Attacks in HUMAN-COMPUTER INTERACTION – INTERACT 2019
  • 2007. Identity Theft — Empirical evidence from a Phishing Exercise in NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS
  • 2019-06-15. Where the User Does Look When Reading Phishing Mails – An Eye-Tracking Study in LEARNING AND COLLABORATION TECHNOLOGIES. DESIGNING LEARNING EXPERIENCES
  • 2016-06-10. Baiting the hook: factors impacting susceptibility to phishing attacks in HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
  • 2014. NoPhish: An Anti-Phishing Education App in SECURITY AND TRUST MANAGEMENT
  • 2017-11-19. Unpacking Spear Phishing Susceptibility in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2008-01-01. Differential Privacy: A Survey of Results in THEORY AND APPLICATIONS OF MODELS OF COMPUTATION
  • 2012. Empirical Benefits of Training to Phishing Susceptibility in INFORMATION SECURITY AND PRIVACY RESEARCH
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1186/s13673-020-00237-7

    DOI

    http://dx.doi.org/10.1186/s13673-020-00237-7

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1130001973


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0805", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Distributed Computing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland", 
              "id": "http://www.grid.ac/institutes/grid.19739.35", 
              "name": [
                "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jampen", 
            "givenName": "Daniel", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland", 
              "id": "http://www.grid.ac/institutes/grid.19739.35", 
              "name": [
                "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "G\u00fcr", 
            "givenName": "G\u00fcrkan", 
            "id": "sg:person.014015704605.14", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014015704605.14"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland", 
              "id": "http://www.grid.ac/institutes/grid.19739.35", 
              "name": [
                "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sutter", 
            "givenName": "Thomas", 
            "id": "sg:person.013145713147.06", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013145713147.06"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland", 
              "id": "http://www.grid.ac/institutes/grid.19739.35", 
              "name": [
                "Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Tellenbach", 
            "givenName": "Bernhard", 
            "id": "sg:person.011304374134.53", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011304374134.53"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-540-79228-4_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012515119", 
              "https://doi.org/10.1007/978-3-540-79228-4_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-29381-9_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1120658863", 
              "https://doi.org/10.1007/978-3-030-29381-9_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00521-016-2275-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027781658", 
              "https://doi.org/10.1007/s00521-016-2275-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-21814-0_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1117873344", 
              "https://doi.org/10.1007/978-3-030-21814-0_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4842-2835-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086026815", 
              "https://doi.org/10.1007/978-1-4842-2835-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-29381-9_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1120658865", 
              "https://doi.org/10.1007/978-3-030-29381-9_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-11851-2_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043469911", 
              "https://doi.org/10.1007/978-3-319-11851-2_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-70278-0_39", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1092752922", 
              "https://doi.org/10.1007/978-3-319-70278-0_39"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-0-387-72367-9_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044836745", 
              "https://doi.org/10.1007/978-0-387-72367-9_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-39218-4_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039746032", 
              "https://doi.org/10.1007/978-3-642-39218-4_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1186/s13673-016-0065-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014373644", 
              "https://doi.org/10.1186/s13673-016-0065-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11409-019-09197-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1118135120", 
              "https://doi.org/10.1007/s11409-019-09197-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10726-009-9167-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004415555", 
              "https://doi.org/10.1007/s10726-009-9167-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-30436-1_37", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026852793", 
              "https://doi.org/10.1007/978-3-642-30436-1_37"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2020-08-09", 
        "datePublishedReg": "2020-08-09", 
        "description": "Email is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many organizations have begun to provide anti-phishing training programs to their employees. A central question in the development of such programs is how they can be designed sustainably and effectively to minimize the vulnerability of employees to phishing attacks. In this paper, we survey and categorize works that consider different elements of such programs via a clearly laid-out methodology, and identify key findings in the technical literature. Overall, we find that researchers agree on the answers to many relevant questions regarding the utility and effectiveness of anti-phishing training. However, we identified influencing factors, such as the impact of age on the success of anti-phishing training programs, for which mixed findings are available. Finally, based on our comprehensive analysis, we describe how a well-founded anti-phishing training program should be designed and parameterized with a set of proposed research directions.", 
        "genre": "article", 
        "id": "sg:pub.10.1186/s13673-020-00237-7", 
        "isAccessibleForFree": true, 
        "isPartOf": [
          {
            "id": "sg:journal.1136381", 
            "issn": [
              "2192-1962"
            ], 
            "name": "Human-centric Computing and Information Sciences", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "1", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "10"
          }
        ], 
        "keywords": [
          "training program", 
          "anti-phishing training", 
          "vulnerability of employees", 
          "such programs", 
          "employees", 
          "impact of age", 
          "personal matters", 
          "research directions", 
          "training", 
          "key findings", 
          "central question", 
          "findings", 
          "such threats", 
          "program", 
          "relevant questions", 
          "questions", 
          "vulnerability", 
          "critical importance", 
          "literature review", 
          "different elements", 
          "researchers", 
          "organization", 
          "threat", 
          "answers", 
          "literature", 
          "email", 
          "age", 
          "success", 
          "effectiveness", 
          "importance", 
          "impact", 
          "direction", 
          "utility", 
          "factors", 
          "communication channels", 
          "development", 
          "work", 
          "review", 
          "set", 
          "methodology", 
          "analysis", 
          "business", 
          "elements", 
          "matter", 
          "paper", 
          "comparative literature review", 
          "attacks", 
          "comprehensive analysis", 
          "technical literature", 
          "channels"
        ], 
        "name": "Don\u2019t click: towards an effective anti-phishing training. A comparative literature review", 
        "pagination": "33", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1130001973"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1186/s13673-020-00237-7"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1186/s13673-020-00237-7", 
          "https://app.dimensions.ai/details/publication/pub.1130001973"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-11-24T21:05", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/article/article_842.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1186/s13673-020-00237-7"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00237-7'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00237-7'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00237-7'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1186/s13673-020-00237-7'


     

    This table displays all metadata directly associated to this object as RDF triples.

    190 TRIPLES      21 PREDICATES      90 URIs      66 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1186/s13673-020-00237-7 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 anzsrc-for:0805
    4 anzsrc-for:0806
    5 schema:author N78f66f6e10fc43ffb14c0c7f92fbbe4d
    6 schema:citation sg:pub.10.1007/978-0-387-72367-9_17
    7 sg:pub.10.1007/978-1-4842-2835-7
    8 sg:pub.10.1007/978-3-030-21814-0_21
    9 sg:pub.10.1007/978-3-030-29381-9_33
    10 sg:pub.10.1007/978-3-030-29381-9_35
    11 sg:pub.10.1007/978-3-319-11851-2_14
    12 sg:pub.10.1007/978-3-319-70278-0_39
    13 sg:pub.10.1007/978-3-540-79228-4_1
    14 sg:pub.10.1007/978-3-642-30436-1_37
    15 sg:pub.10.1007/978-3-642-39218-4_27
    16 sg:pub.10.1007/s00521-016-2275-y
    17 sg:pub.10.1007/s10726-009-9167-9
    18 sg:pub.10.1007/s11409-019-09197-5
    19 sg:pub.10.1186/s13673-016-0065-2
    20 schema:datePublished 2020-08-09
    21 schema:datePublishedReg 2020-08-09
    22 schema:description Email is of critical importance as a communication channel for both business and personal matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such threats, many organizations have begun to provide anti-phishing training programs to their employees. A central question in the development of such programs is how they can be designed sustainably and effectively to minimize the vulnerability of employees to phishing attacks. In this paper, we survey and categorize works that consider different elements of such programs via a clearly laid-out methodology, and identify key findings in the technical literature. Overall, we find that researchers agree on the answers to many relevant questions regarding the utility and effectiveness of anti-phishing training. However, we identified influencing factors, such as the impact of age on the success of anti-phishing training programs, for which mixed findings are available. Finally, based on our comprehensive analysis, we describe how a well-founded anti-phishing training program should be designed and parameterized with a set of proposed research directions.
    23 schema:genre article
    24 schema:isAccessibleForFree true
    25 schema:isPartOf N7f92cf5863c448d3b7c81d0b5d5fbf72
    26 Nbe2ade90ea33440487487898ec4a8bb8
    27 sg:journal.1136381
    28 schema:keywords age
    29 analysis
    30 answers
    31 anti-phishing training
    32 attacks
    33 business
    34 central question
    35 channels
    36 communication channels
    37 comparative literature review
    38 comprehensive analysis
    39 critical importance
    40 development
    41 different elements
    42 direction
    43 effectiveness
    44 elements
    45 email
    46 employees
    47 factors
    48 findings
    49 impact
    50 impact of age
    51 importance
    52 key findings
    53 literature
    54 literature review
    55 matter
    56 methodology
    57 organization
    58 paper
    59 personal matters
    60 program
    61 questions
    62 relevant questions
    63 research directions
    64 researchers
    65 review
    66 set
    67 success
    68 such programs
    69 such threats
    70 technical literature
    71 threat
    72 training
    73 training program
    74 utility
    75 vulnerability
    76 vulnerability of employees
    77 work
    78 schema:name Don’t click: towards an effective anti-phishing training. A comparative literature review
    79 schema:pagination 33
    80 schema:productId Na5848ac08f4943f1bc0c7f80458a2a97
    81 Ne350a7d176f74b198e00f4bbc91fcb1c
    82 schema:sameAs https://app.dimensions.ai/details/publication/pub.1130001973
    83 https://doi.org/10.1186/s13673-020-00237-7
    84 schema:sdDatePublished 2022-11-24T21:05
    85 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    86 schema:sdPublisher Nc29c9e75da79475baf87a930a6d7184f
    87 schema:url https://doi.org/10.1186/s13673-020-00237-7
    88 sgo:license sg:explorer/license/
    89 sgo:sdDataset articles
    90 rdf:type schema:ScholarlyArticle
    91 N58f1b810365d483b939b1fed4cfe6461 rdf:first sg:person.013145713147.06
    92 rdf:rest Na2eb407e39234cb58d5bd9563fa9c706
    93 N6213d6b623e142f29fdcfcc8afa84b1c schema:affiliation grid-institutes:grid.19739.35
    94 schema:familyName Jampen
    95 schema:givenName Daniel
    96 rdf:type schema:Person
    97 N78f66f6e10fc43ffb14c0c7f92fbbe4d rdf:first N6213d6b623e142f29fdcfcc8afa84b1c
    98 rdf:rest Nd80e16f9e74c4df493fc108d41ed3ef6
    99 N7f92cf5863c448d3b7c81d0b5d5fbf72 schema:issueNumber 1
    100 rdf:type schema:PublicationIssue
    101 Na2eb407e39234cb58d5bd9563fa9c706 rdf:first sg:person.011304374134.53
    102 rdf:rest rdf:nil
    103 Na5848ac08f4943f1bc0c7f80458a2a97 schema:name doi
    104 schema:value 10.1186/s13673-020-00237-7
    105 rdf:type schema:PropertyValue
    106 Nbe2ade90ea33440487487898ec4a8bb8 schema:volumeNumber 10
    107 rdf:type schema:PublicationVolume
    108 Nc29c9e75da79475baf87a930a6d7184f schema:name Springer Nature - SN SciGraph project
    109 rdf:type schema:Organization
    110 Nd80e16f9e74c4df493fc108d41ed3ef6 rdf:first sg:person.014015704605.14
    111 rdf:rest N58f1b810365d483b939b1fed4cfe6461
    112 Ne350a7d176f74b198e00f4bbc91fcb1c schema:name dimensions_id
    113 schema:value pub.1130001973
    114 rdf:type schema:PropertyValue
    115 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    116 schema:name Information and Computing Sciences
    117 rdf:type schema:DefinedTerm
    118 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    119 schema:name Artificial Intelligence and Image Processing
    120 rdf:type schema:DefinedTerm
    121 anzsrc-for:0805 schema:inDefinedTermSet anzsrc-for:
    122 schema:name Distributed Computing
    123 rdf:type schema:DefinedTerm
    124 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    125 schema:name Information Systems
    126 rdf:type schema:DefinedTerm
    127 sg:journal.1136381 schema:issn 2192-1962
    128 schema:name Human-centric Computing and Information Sciences
    129 schema:publisher Springer Nature
    130 rdf:type schema:Periodical
    131 sg:person.011304374134.53 schema:affiliation grid-institutes:grid.19739.35
    132 schema:familyName Tellenbach
    133 schema:givenName Bernhard
    134 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011304374134.53
    135 rdf:type schema:Person
    136 sg:person.013145713147.06 schema:affiliation grid-institutes:grid.19739.35
    137 schema:familyName Sutter
    138 schema:givenName Thomas
    139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013145713147.06
    140 rdf:type schema:Person
    141 sg:person.014015704605.14 schema:affiliation grid-institutes:grid.19739.35
    142 schema:familyName Gür
    143 schema:givenName Gürkan
    144 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014015704605.14
    145 rdf:type schema:Person
    146 sg:pub.10.1007/978-0-387-72367-9_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044836745
    147 https://doi.org/10.1007/978-0-387-72367-9_17
    148 rdf:type schema:CreativeWork
    149 sg:pub.10.1007/978-1-4842-2835-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086026815
    150 https://doi.org/10.1007/978-1-4842-2835-7
    151 rdf:type schema:CreativeWork
    152 sg:pub.10.1007/978-3-030-21814-0_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1117873344
    153 https://doi.org/10.1007/978-3-030-21814-0_21
    154 rdf:type schema:CreativeWork
    155 sg:pub.10.1007/978-3-030-29381-9_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1120658863
    156 https://doi.org/10.1007/978-3-030-29381-9_33
    157 rdf:type schema:CreativeWork
    158 sg:pub.10.1007/978-3-030-29381-9_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1120658865
    159 https://doi.org/10.1007/978-3-030-29381-9_35
    160 rdf:type schema:CreativeWork
    161 sg:pub.10.1007/978-3-319-11851-2_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043469911
    162 https://doi.org/10.1007/978-3-319-11851-2_14
    163 rdf:type schema:CreativeWork
    164 sg:pub.10.1007/978-3-319-70278-0_39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092752922
    165 https://doi.org/10.1007/978-3-319-70278-0_39
    166 rdf:type schema:CreativeWork
    167 sg:pub.10.1007/978-3-540-79228-4_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012515119
    168 https://doi.org/10.1007/978-3-540-79228-4_1
    169 rdf:type schema:CreativeWork
    170 sg:pub.10.1007/978-3-642-30436-1_37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026852793
    171 https://doi.org/10.1007/978-3-642-30436-1_37
    172 rdf:type schema:CreativeWork
    173 sg:pub.10.1007/978-3-642-39218-4_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039746032
    174 https://doi.org/10.1007/978-3-642-39218-4_27
    175 rdf:type schema:CreativeWork
    176 sg:pub.10.1007/s00521-016-2275-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1027781658
    177 https://doi.org/10.1007/s00521-016-2275-y
    178 rdf:type schema:CreativeWork
    179 sg:pub.10.1007/s10726-009-9167-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004415555
    180 https://doi.org/10.1007/s10726-009-9167-9
    181 rdf:type schema:CreativeWork
    182 sg:pub.10.1007/s11409-019-09197-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1118135120
    183 https://doi.org/10.1007/s11409-019-09197-5
    184 rdf:type schema:CreativeWork
    185 sg:pub.10.1186/s13673-016-0065-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014373644
    186 https://doi.org/10.1186/s13673-016-0065-2
    187 rdf:type schema:CreativeWork
    188 grid-institutes:grid.19739.35 schema:alternateName Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland
    189 schema:name Institute of Applied Information Technology (InIT), Zurich University of Applied Sciences (ZHAW), 8401, Winterthur, Switzerland
    190 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...