-
2
-
-
34250775897
-
-
Anti-Phishing Group of City University of Hong Kong, http://antiphishing. cs.cityu.edu.hk
-
Anti-Phishing Group of City University of Hong Kong, http://antiphishing. cs.cityu.edu.hk
-
-
-
-
3
-
-
85027120504
-
-
Anti-Phishing Working Group, http://www.antiphishing.org.
-
Group
-
-
Working, A.1
-
4
-
-
0003841075
-
-
RFC 3986
-
Berners-Lee T., Fielding R., Masinter L., RFC 3986: Uniform Resource Identifier (URI): Generic Syntax, The Internet Society (2005), Jan. 2005.
-
(2005)
Uniform Resource Identifier (URI): Generic Syntax, The Internet Society (2005), Jan
-
-
Berners-Lee, T.1
Fielding, R.2
Masinter, L.3
-
5
-
-
0013206133
-
Collection statistics for fast duplicate document detection
-
Chowdhury A., Frieder O., Grossman D., and McCabe. M. Collection statistics for fast duplicate document detection, ACM Transactions on Information Systems, Volume 20(2), pages 171-191, 2002.
-
(2002)
ACM Transactions on Information Systems
, vol.20
, Issue.2
, pp. 171-191
-
-
Chowdhury, A.1
Frieder, O.2
Grossman, D.3
McCabe, M.4
-
6
-
-
33745816410
-
-
Dhamija R., Tygar J. D., and Hearst M. Why Phishing Works, to appear in Proceedings of CHI-2006: Conference on Human Factors in Computing Systems, April 2006.
-
Dhamija R., Tygar J. D., and Hearst M. Why Phishing Works, to appear in Proceedings of CHI-2006: Conference on Human Factors in Computing Systems, April 2006.
-
-
-
-
10
-
-
33744797941
-
A Potential IRI based Phishing Strategy
-
Proceedings of 6th International Conference on Web Information Systems Engineering
-
Fu A. Y., Deng X., Liu W., A Potential IRI based Phishing Strategy, in the Proceedings of 6th International Conference on Web Information Systems Engineering, LNCS Volume 3806, pages 618-619, 2005
-
(2005)
LNCS
, vol.3806
, pp. 618-619
-
-
Fu, A.Y.1
Deng, X.2
Liu, W.3
-
13
-
-
34250696924
-
-
Garfinkel, S., Miller, R., Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express. SOUPS, 2005.
-
Garfinkel, S., Miller, R., Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express. SOUPS, 2005.
-
-
-
-
14
-
-
0037319544
-
Methods for identifying versioned and plagiarized documents
-
Hoad T.C., Zobel J. Methods for identifying versioned and plagiarized documents, Journal of the American Society for Information Science and Technology, Volume 54(3), pages 203-215, 2003.
-
(2003)
Journal of the American Society for Information Science and Technology
, vol.54
, Issue.3
, pp. 203-215
-
-
Hoad, T.C.1
Zobel, J.2
-
15
-
-
34250691401
-
-
ICANN
-
ICANN, http://www.icann.org/topics/idn/implementation-guidelines.htm
-
-
-
-
16
-
-
34250708871
-
-
ICANN
-
ICANN, http://www.icann.org/
-
-
-
-
18
-
-
0001311748
-
The TREC-5 Confusion Track: Comparing Retrieval Methods for Scanned Text
-
Kantor P., Voorhees E., The TREC-5 Confusion Track: Comparing Retrieval Methods for Scanned Text, Information Retrieval, Volume 2(2/3), pages 165-176, 2000.
-
(2000)
Information Retrieval
, vol.2
, Issue.2-3
, pp. 165-176
-
-
Kantor, P.1
Voorhees, E.2
-
19
-
-
34250789088
-
-
SIAM Journal on Computing, :323 C350, Citations. Original publication
-
Knuth D., Morris J. H., and Pratt V., Fast pattern matching in strings. SIAM Journal on Computing, 6(2):323 C350. 1977. Citations. Original publication.
-
(1977)
Fast pattern matching in strings
, vol.6
, Issue.2
-
-
Knuth, D.1
Morris, J.H.2
Pratt, V.3
-
20
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions, and reversals
-
pages
-
Levenshtein V.I., Binary codes capable of correcting deletions, insertions, and reversals, Cybernetics and Control Theory, Volume 10, pages707-710, 1966.
-
(1966)
Cybernetics and Control Theory
, vol.10
, pp. 707-710
-
-
Levenshtein, V.I.1
-
21
-
-
33645131523
-
An Anti-Phishing Strategy based on Visual Similarity Assessment
-
Liu W., Deng X, Huang G., Fu A. Y., An Anti-Phishing Strategy based on Visual Similarity Assessment, IEEE Internet Computing, Vol. 10, No. 2, pp. 58-65, 2006
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Deng, X.2
Huang, G.3
Fu, A.Y.4
-
22
-
-
34250744060
-
-
Microsoft, Arial Unicode MS, Version 1.01, 2000
-
Microsoft, Arial Unicode MS, Version 1.01, 2000.
-
-
-
-
23
-
-
34250747839
-
-
Microsoft, Description of the Arial Unicode MS font in Word 2002, http://support.microsoft.com/kb/q287247.
-
Microsoft, Description of the Arial Unicode MS font in Word 2002, http://support.microsoft.com/kb/q287247.
-
-
-
-
25
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
Needleman S. and Wunsch C., A general method applicable to the search for similarities in the amino acid sequence of two proteins, Journal of Molecular Biology, 48(3):443-453, 1970.
-
(1970)
Journal of Molecular Biology
, vol.48
, Issue.3
, pp. 443-453
-
-
Needleman, S.1
Wunsch, C.2
-
26
-
-
34250708346
-
-
Netscape, http://wp.netscape.com/eng/ssl3.
-
Netscape
-
-
-
27
-
-
34250699905
-
-
The Unicode Consortium
-
The Unicode Consortium, http://www.unicode.org.
-
-
-
-
29
-
-
33745851447
-
-
to appear in CHI
-
Wu, M., Miller, R., Garfinkel, S., Do Security Toolbars Actually Prevent Phishing Attacks?, to appear in CHI 2006
-
(2006)
Do Security Toolbars Actually Prevent Phishing Attacks
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
|