-
2
-
-
34548344520
-
-
March
-
Anti-Phishing Working Group. Phishing Activity Trends Report, March 2005. http://antiphishing.org/ APWG_Phishing_Activity_Report_March_2005.pdf
-
(2005)
Phishing Activity Trends Report
-
-
-
3
-
-
33846786596
-
'Spear phishing' tests educate people about online scams
-
August 17
-
Bank, D. 'Spear Phishing' Tests Educate People About Online Scams. The Wall Street Journal. August 17, 2005.
-
(2005)
The Wall Street Journal
-
-
Bank, D.1
-
4
-
-
84900762271
-
-
Passwords Revealed by Sweet Deal
-
BBC News. Passwords revealed by sweet deal. http://news.bbc.co.Uk/l/hi/technology/3639679.stm
-
BBC News
-
-
-
5
-
-
33746659990
-
Client-side defense against web-based identity theft
-
Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C. Client-Side Defense Against Web-Based Identity Theft, 11th Annual Network and Distributed System Security Symposium (2004).
-
(2004)
11th Annual Network and Distributed System Security Symposium
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Mitchell, J.C.4
-
8
-
-
33745859653
-
Online identity theft: Phishing technology, chokepoints and countermeasures
-
October 3
-
Emigh, A. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures. ITTC Report on Online Identity Theft Technology and Countermeasures. October 3, 2005. http://www.antiphishing.org/Phishing-dhs-report.pdf
-
(2005)
ITTC Report on Online Identity Theft Technology and Countermeasures
-
-
Emigh, A.1
-
10
-
-
84858918667
-
-
Computer Crime Research Center. March 16
-
Fluendy, S. Phishing targeting online outlets. Computer Crime Research Center. March 16, 2005. http://www.crime-research.org/news/03.16.2005/1050/
-
(2005)
Phishing Targeting Online Outlets
-
-
Fluendy, S.1
-
11
-
-
0035034830
-
What makes Web sites credible?: A report on a large quantitative study
-
Fogg, B.J, et al. What makes Web sites credible?: a report on a large quantitative study. CHI2001, pp. 61-68.
-
CHI2001
, pp. 61-68
-
-
Fogg, B.J.1
-
14
-
-
33745831496
-
-
School of Informatics & Dept. of Computer Science, Indiana University
-
Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F. Social Phishing. School of Informatics & Dept. of Computer Science, Indiana University. 2005. http://informatics.indiana.edu/fil/Net/social_phishing.pdf
-
(2005)
Social Phishing
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
15
-
-
33745816273
-
US phishing losses hit 5500m
-
September 29
-
Leyden, J. US phishing losses hit 5500m. The Register. September 29, 2004.
-
(2004)
The Register
-
-
Leyden, J.1
-
16
-
-
33745858939
-
-
Netcraft Toolbar. 2004. http://toolbar.netcraft.com/.
-
(2004)
Netcraft Toolbar
-
-
-
17
-
-
84976800746
-
Design rules based on analyses of human error
-
April
-
Norman, D. A. Design rules based on analyses of human error. CACM, v26 n4 (April 1983), pp. 254-258.
-
(1983)
CACM
, vol.26
, Issue.4
, pp. 254-258
-
-
Norman, D.A.1
-
18
-
-
84858907315
-
-
PassMark. 2005. http://www.passmarksecurity.com/.
-
(2005)
-
-
-
19
-
-
33745861599
-
-
September 9
-
Sharif, T. Phishing Filter in IE7, September 9, 2006. http://blogs.msdn.com/ie/archive/2005/09/09/463204.aspx
-
(2006)
Phishing Filter in IE7
-
-
Sharif, T.1
-
20
-
-
84858919330
-
-
SpoofStick. 2004. http://www.spoofstick.com/.
-
(2004)
-
-
-
22
-
-
32244434492
-
Gathering evidence: Use of visual security cues in web browsing
-
Whalen, T., Inkpen, K. Gathering Evidence: Use of Visual Security Cues in Web Browsing. Graphics Interface 2005.
-
Graphics Interface 2005
-
-
Whalen, T.1
Inkpen, K.2
-
23
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of POP 5.0
-
Whitten, A., Tygar, J.D. Why Johnny Can't Encrypt: A Usability Evaluation of POP 5.0. 8th Usenix Security Symposium, 1999, pp. 169-184.
-
(1999)
8th Usenix Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
24
-
-
34250725336
-
Secure web authentication with mobile phones
-
Wu, M., Garfinkel, S., Miller, R. Secure Web Authentication with Mobile Phones. DIMACS Workshop on Usable Privacy and Security Software, 2004.
-
DIMACS Workshop on Usable Privacy and Security Software, 2004
-
-
Wu, M.1
Garfinkel, S.2
Miller, R.3
|