-
1
-
-
34249852724
-
-
Anti-phishing working group APWG, March, 2006
-
Anti-phishing working group (APWG): Phishing attack Trends Report-March 2006 (2006). http://www.antiphishing.org/reports/apwg_report_mar_06.pdf. Cited 9 Nov 2006
-
(2006)
Phishing attack Trends Report
-
-
-
2
-
-
34249855024
-
-
Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: SpoofGuard (2004). http://crypto.stanford.edu/SpoofGuard/. Cited 27 July 2006
-
(2004)
SpoofGuard
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
3
-
-
34250737359
-
Decision strategies and susceptibility to phishing
-
Downs, J., Holbrook, M., Cranor, L.: Decision strategies and susceptibility to phishing. In: Proceedings of the 2006 symposium On usable privacy and security, pp. 79-90 (2006)
-
(2006)
Proceedings of the 2006 symposium On usable privacy and security
, pp. 79-90
-
-
Downs, J.1
Holbrook, M.2
Cranor, L.3
-
4
-
-
33745816410
-
-
Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: The proceedings of the conference on human factors in computing systems (2006). http://people.deas.harvard.edu/~rachna/papers/why_phishing_works.pdf. Cited 11 Nov 2006
-
Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: The proceedings of the conference on human factors in computing systems (2006). http://people.deas.harvard.edu/~rachna/papers/why_phishing_works.pdf. Cited 11 Nov 2006
-
-
-
-
5
-
-
33749551929
-
Why spoofing is serious internet fraud
-
Dinev, T.: Why spoofing is serious internet fraud. Commun. ACM, 49(10), 76-82 (2006)
-
(2006)
Commun. ACM
, vol.49
, Issue.10
, pp. 76-82
-
-
Dinev, T.1
-
6
-
-
34249858681
-
-
FBI National Press Office: Web 'Spoofing' Scams Are a Growing Problem. In: Press Release, Washington D.C. (2003) http://www.fbi.gov/pressrel/ pressrel03/spoofing072103.htm. Cited 10 Nov 2006
-
FBI National Press Office: Web 'Spoofing' Scams Are a Growing Problem. In: Press Release, Washington D.C. (2003) http://www.fbi.gov/pressrel/ pressrel03/spoofing072103.htm. Cited 10 Nov 2006
-
-
-
-
8
-
-
50049119289
-
-
Google: Google safe browsing (2006). http://www.google.com/support/ firefox/bin/static.py?page=features.html&v=2.0f. Cited 10 Oct 2006
-
(2006)
Google safe browsing
-
-
Google1
-
9
-
-
24344480083
-
Security usability
-
Gutmann, P., Grigg, I.: Security usability. Secur. Priv. Mag. IEEE, 3(4), 56-58 (2005)
-
(2005)
Secur. Priv. Mag. IEEE
, vol.3
, Issue.4
, pp. 56-58
-
-
Gutmann, P.1
Grigg, I.2
-
10
-
-
33845954184
-
Modeling and preventing phishing attacks
-
Jakobsson, M.: Modeling and preventing phishing attacks. In: Phishing panel of financial cryptography (2005). http://www.informatics.indiana.edu/ markus/papers/phishing_jakobsson.pdf. Cited 1 Nov 2006
-
(2005)
Phishing panel of financial cryptography
-
-
Jakobsson, M.1
-
17
-
-
34249855125
-
-
Stop-phishing group , 20 Oct
-
Stop-phishing group (2006). http://www.indiana.edu/~phishing/?people= external. Cited 20 Oct 2006
-
(2006)
-
-
-
18
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
22-27 April Montréal, pp, 2006
-
Wu, M., Miller, R., Garfinkel, S.: Do security toolbars actually prevent phishing attacks? In: Proceedings of the CHI 2006. 22-27 April 2006 Montréal, pp. 601-610 (2006)
-
(2006)
Proceedings of the CHI
, pp. 601-610
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
-
19
-
-
35348924865
-
Phinding Phish: Evaluating anti-phishing toolbars. In: Carnegie Mellon University
-
CMU-CyLab-06-018 , 15 Nov
-
Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding Phish: evaluating anti-phishing toolbars. In: Carnegie Mellon University, CyLab Technical Report. CMU-CyLab-06-018 (2006). http://www.cylab.cmu.edu/default.aspx?id=2255. Cited 15 Nov 2006
-
(2006)
CyLab Technical Report
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
|