-
2
-
-
35348843540
-
-
Anti Phishing Working Group
-
Anti Phishing Working Group, "Phishing Trend Report(s)," 2007, http: //www.antiphishing.com.
-
(2007)
Phishing Trend Report(s)
-
-
-
4
-
-
35348890942
-
-
G. Borges, Rechtsfragen des Phishing - Ein Überblick, NJW, p. 3313, 2006, (in German).
-
G. Borges, "Rechtsfragen des Phishing - Ein Überblick," NJW, p. 3313, 2006, (in German).
-
-
-
-
5
-
-
35348847240
-
Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships
-
S. Brenner, "Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships," North Carolina Journal of Law and Technology, vol. 4, no. 1, 2002.
-
(2002)
North Carolina Journal of Law and Technology
, vol.4
, Issue.1
-
-
Brenner, S.1
-
7
-
-
35348853854
-
-
26 August
-
Infopackets Newsletter, "The Word of Today: Phishing," 26 August 2005, http://www.infopackets.com/channels/en/pause_for_thought/ word_of_the_day/2005/20050826_phishing.htm.
-
(2005)
The Word of Today: Phishing
-
-
Newsletter, I.1
-
8
-
-
33845530304
-
Distributed Phishing Attacks
-
Cryptology ePrint Archive, Report 2005/091
-
M. Jakobsson and A. Young, "Distributed Phishing Attacks," Cryptology ePrint Archive, Report 2005/091, 2005, http://eprint.iacr.org/2005/ 091.
-
(2005)
-
-
Jakobsson, M.1
Young, A.2
-
9
-
-
35348909690
-
-
Working Group Identity Protection
-
Working Group Identity Protection, "List of German phishing mails," 2007, https://www.a-i3.org/content/category/5/36/216/.
-
(2007)
List of German phishing mails
-
-
-
12
-
-
33646146835
-
Modeling and Preventing Phishing Attacks
-
M. Jakobbson, "Modeling and Preventing Phishing Attacks." in Financial Cryptography, 2005.
-
(2005)
Financial Cryptography
-
-
Jakobbson, M.1
-
13
-
-
34848911641
-
Social phishing, 2007
-
to appear in
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," 2007, to appear in Communications of the ACM.
-
Communications of the ACM
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
14
-
-
35348879224
-
Phishers get personal
-
26 May, /Phishers+get+personal/2100-7349_3-5720672.html
-
J. Evers, "Phishers get personal," 26 May 2005, http://news.com.com/Phishers+get+personal/2100-7349_3-5720672.html.
-
(2005)
-
-
Evers, J.1
-
15
-
-
35348921256
-
Example of purchasable Malware Services - Shadowcrew.com Forum
-
"Example of purchasable Malware Services - Shadowcrew.com Forum," 2002, http://web.archive.org/web/2002101417523 4/www.shadowcrew. com/forum/viewforum.php?f=2.
-
(2002)
-
-
-
16
-
-
35348903936
-
Example of purchasable Malware Services - Darkprofits.com Web Site
-
"Example of purchasable Malware Services - Darkprofits.com Web Site," 2003, http://web.archive.org/web/20030805031336/www.darkprofits.com/ index.php.
-
(2003)
-
-
-
19
-
-
35348869907
-
-
A Joint Report of the US Department of Homeland Security SRI International Identity Theft Technology Council and the Anti-Phishing Working Group, The crimeware landscape: Malware, phishing, identity theft and beyond, 2006
-
A Joint Report of the US Department of Homeland Security SRI International Identity Theft Technology Council and the Anti-Phishing Working Group, "The crimeware landscape: Malware, phishing, identity theft and beyond," 2006, http://www.antiphishing.org/reports/APWG_CrimewareReport. pdf.
-
-
-
-
20
-
-
35348816853
-
Organized Crime And Gambling
-
President's Commission On Organized Crime, Washington, DC, U.S. Government Printing Office
-
President's Commission On Organized Crime, "Organized Crime And Gambling. Record Of Hearing VII. Washington , DC : U.S. Government Printing Office," 1984.
-
(1984)
Record Of Hearing VII
-
-
-
23
-
-
34548472610
-
An Introductory: Who is Who for Money Laundering Investigators
-
R. E. Bell, "An Introductory: Who is Who for Money Laundering Investigators," Journal of Money Laundering Control, vol. 5, pp. 287-295, 2002.
-
(2002)
Journal of Money Laundering Control
, vol.5
, pp. 287-295
-
-
Bell, R.E.1
-
24
-
-
35348901477
-
-
U.S. Costums Service, Office of Intelligence Headquarters
-
U.S. Costums Service - Office of Intelligence Headquarters, "Money Laundering," 1989.
-
(1989)
Money Laundering
-
-
-
25
-
-
35348840993
-
Geldwäscherei - Money Laundering. Eine vergle-ichende Darstellung des Rechts und der Erscheinungsformen in den USA und der Schweiz
-
Schweizer Schriften zum Bankrecht, Band, in German
-
J.-B. Ackermann, "Geldwäscherei - Money Laundering. Eine vergle-ichende Darstellung des Rechts und der Erscheinungsformen in den USA und der Schweiz," in Schweizer Schriften zum Bankrecht, ser. Band 12, 1992, (in German).
-
(1992)
ser
, vol.12
-
-
Ackermann, J.-B.1
-
26
-
-
35348849172
-
-
Working Group Identity Protection
-
Working Group Identity Protection, "List of emails seeking for financial agents," 2007, https://www.a-i3.Org/content/category/5/57/138/.
-
(2007)
List of emails seeking for financial agents
-
-
-
28
-
-
35348928800
-
-
_, "STILL: Employment Contract," 2006, https://www.a-i3.org/ images/stories/Download/arbeitsvertrag_still.pdf.
-
(2006)
STILL: Employment Contract
-
-
-
31
-
-
34548172244
-
Stopping a phishing attack, even when the victims ignore warnings
-
Microsoft Research MSR, Tech. Rep. MSR-TR-2005-142
-
D. Florencio and C. Herley, "Stopping a phishing attack, even when the victims ignore warnings," Microsoft Research (MSR), Tech. Rep. MSR-TR-2005-142, 2005.
-
(2005)
-
-
Florencio, D.1
Herley, C.2
-
33
-
-
85044841595
-
Client-side defense against web-based identity theft
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C. Mitchell, "Client-side defense against web-based identity theft," in 11th Annual Network and Distributed System Security Symposium (NDSS '04), 2004.
-
(2004)
11th Annual Network and Distributed System Security Symposium (NDSS '04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
34
-
-
34548150723
-
Compartmented security for browsers - or how to thwart a phisher with trusted computing
-
to appear
-
S. Gajek, A.-R. Sadeghi, C. Stueble, and M. Winandy, "Compartmented security for browsers - or how to thwart a phisher with trusted computing," in ARES, 2007, to appear.
-
(2007)
ARES
-
-
Gajek, S.1
Sadeghi, A.-R.2
Stueble, C.3
Winandy, M.4
-
35
-
-
60649118511
-
-
Horst Görtz Institute for IT Security, Ruhr University Bochum, Tech. Rep. TR-HGI-01-2006
-
D. Birk, M. Dornseif, S. Gajek, and F. Gröbert, "Phishing phisherstracing identity thieves and money launderers," Horst Görtz Institute for IT Security, Ruhr University Bochum, Tech. Rep. TR-HGI-01-2006, 2006.
-
(2006)
Phishing phisherstracing identity thieves and money launderers
-
-
Birk, D.1
Dornseif, M.2
Gajek, S.3
Gröbert, F.4
-
38
-
-
35348834896
-
-
P. J. Leahy, "Anti-phishing Act," 2005, https://www.a-i3.org/ images/stories/recht/us_gesetz.pdf.
-
(2005)
Anti-phishing Act
-
-
Leahy, P.J.1
-
39
-
-
35348910274
-
-
B. H. Office, Fraud Bill HL Bill 7, 2005, https://www.a-i3.org/images/stories/recht/brit_gesetz.pdf.
-
B. H. Office, "Fraud Bill HL Bill 7," 2005, https://www.a-i3.org/images/stories/recht/brit_gesetz.pdf.
-
-
-
-
40
-
-
35348826228
-
The Prevention of Money Laundering: A Comparative Analysis
-
M. Pieth, "The Prevention of Money Laundering: A Comparative Analysis," European Journal of Crime, Criminal Law and Criminal Justice, vol. 6, no. 2, 1998.
-
(1998)
European Journal of Crime, Criminal Law and Criminal Justice
, vol.6
, Issue.2
-
-
Pieth, M.1
|