메뉴 건너뛰기




Volumn , Issue , 2007, Pages 3-8

Phishing phishers - Observing and tracing organized cybercrime

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SUPPORTED COOPERATIVE WORK; CYBERNETICS; IDENTIFICATION (CONTROL SYSTEMS); INTERNET; PROBLEM SOLVING;

EID: 35348895913     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIMP.2007.33     Document Type: Conference Paper
Times cited : (20)

References (41)
  • 2
    • 35348843540 scopus 로고    scopus 로고
    • Anti Phishing Working Group
    • Anti Phishing Working Group, "Phishing Trend Report(s)," 2007, http: //www.antiphishing.com.
    • (2007) Phishing Trend Report(s)
  • 4
    • 35348890942 scopus 로고    scopus 로고
    • G. Borges, Rechtsfragen des Phishing - Ein Überblick, NJW, p. 3313, 2006, (in German).
    • G. Borges, "Rechtsfragen des Phishing - Ein Überblick," NJW, p. 3313, 2006, (in German).
  • 5
    • 35348847240 scopus 로고    scopus 로고
    • Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships
    • S. Brenner, "Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships," North Carolina Journal of Law and Technology, vol. 4, no. 1, 2002.
    • (2002) North Carolina Journal of Law and Technology , vol.4 , Issue.1
    • Brenner, S.1
  • 7
    • 35348853854 scopus 로고    scopus 로고
    • 26 August
    • Infopackets Newsletter, "The Word of Today: Phishing," 26 August 2005, http://www.infopackets.com/channels/en/pause_for_thought/ word_of_the_day/2005/20050826_phishing.htm.
    • (2005) The Word of Today: Phishing
    • Newsletter, I.1
  • 8
    • 33845530304 scopus 로고    scopus 로고
    • Distributed Phishing Attacks
    • Cryptology ePrint Archive, Report 2005/091
    • M. Jakobsson and A. Young, "Distributed Phishing Attacks," Cryptology ePrint Archive, Report 2005/091, 2005, http://eprint.iacr.org/2005/ 091.
    • (2005)
    • Jakobsson, M.1    Young, A.2
  • 9
    • 35348909690 scopus 로고    scopus 로고
    • Working Group Identity Protection
    • Working Group Identity Protection, "List of German phishing mails," 2007, https://www.a-i3.org/content/category/5/36/216/.
    • (2007) List of German phishing mails
  • 12
    • 33646146835 scopus 로고    scopus 로고
    • Modeling and Preventing Phishing Attacks
    • M. Jakobbson, "Modeling and Preventing Phishing Attacks." in Financial Cryptography, 2005.
    • (2005) Financial Cryptography
    • Jakobbson, M.1
  • 14
    • 35348879224 scopus 로고    scopus 로고
    • Phishers get personal
    • 26 May, /Phishers+get+personal/2100-7349_3-5720672.html
    • J. Evers, "Phishers get personal," 26 May 2005, http://news.com.com/Phishers+get+personal/2100-7349_3-5720672.html.
    • (2005)
    • Evers, J.1
  • 15
    • 35348921256 scopus 로고    scopus 로고
    • Example of purchasable Malware Services - Shadowcrew.com Forum
    • "Example of purchasable Malware Services - Shadowcrew.com Forum," 2002, http://web.archive.org/web/2002101417523 4/www.shadowcrew. com/forum/viewforum.php?f=2.
    • (2002)
  • 16
    • 35348903936 scopus 로고    scopus 로고
    • Example of purchasable Malware Services - Darkprofits.com Web Site
    • "Example of purchasable Malware Services - Darkprofits.com Web Site," 2003, http://web.archive.org/web/20030805031336/www.darkprofits.com/ index.php.
    • (2003)
  • 19
    • 35348869907 scopus 로고    scopus 로고
    • A Joint Report of the US Department of Homeland Security SRI International Identity Theft Technology Council and the Anti-Phishing Working Group, The crimeware landscape: Malware, phishing, identity theft and beyond, 2006
    • A Joint Report of the US Department of Homeland Security SRI International Identity Theft Technology Council and the Anti-Phishing Working Group, "The crimeware landscape: Malware, phishing, identity theft and beyond," 2006, http://www.antiphishing.org/reports/APWG_CrimewareReport. pdf.
  • 20
    • 35348816853 scopus 로고
    • Organized Crime And Gambling
    • President's Commission On Organized Crime, Washington, DC, U.S. Government Printing Office
    • President's Commission On Organized Crime, "Organized Crime And Gambling. Record Of Hearing VII. Washington , DC : U.S. Government Printing Office," 1984.
    • (1984) Record Of Hearing VII
  • 23
    • 34548472610 scopus 로고    scopus 로고
    • An Introductory: Who is Who for Money Laundering Investigators
    • R. E. Bell, "An Introductory: Who is Who for Money Laundering Investigators," Journal of Money Laundering Control, vol. 5, pp. 287-295, 2002.
    • (2002) Journal of Money Laundering Control , vol.5 , pp. 287-295
    • Bell, R.E.1
  • 24
    • 35348901477 scopus 로고
    • U.S. Costums Service, Office of Intelligence Headquarters
    • U.S. Costums Service - Office of Intelligence Headquarters, "Money Laundering," 1989.
    • (1989) Money Laundering
  • 25
    • 35348840993 scopus 로고
    • Geldwäscherei - Money Laundering. Eine vergle-ichende Darstellung des Rechts und der Erscheinungsformen in den USA und der Schweiz
    • Schweizer Schriften zum Bankrecht, Band, in German
    • J.-B. Ackermann, "Geldwäscherei - Money Laundering. Eine vergle-ichende Darstellung des Rechts und der Erscheinungsformen in den USA und der Schweiz," in Schweizer Schriften zum Bankrecht, ser. Band 12, 1992, (in German).
    • (1992) ser , vol.12
    • Ackermann, J.-B.1
  • 26
    • 35348849172 scopus 로고    scopus 로고
    • Working Group Identity Protection
    • Working Group Identity Protection, "List of emails seeking for financial agents," 2007, https://www.a-i3.Org/content/category/5/57/138/.
    • (2007) List of emails seeking for financial agents
  • 28
    • 35348928800 scopus 로고    scopus 로고
    • _, "STILL: Employment Contract," 2006, https://www.a-i3.org/ images/stories/Download/arbeitsvertrag_still.pdf.
    • (2006) STILL: Employment Contract
  • 31
    • 34548172244 scopus 로고    scopus 로고
    • Stopping a phishing attack, even when the victims ignore warnings
    • Microsoft Research MSR, Tech. Rep. MSR-TR-2005-142
    • D. Florencio and C. Herley, "Stopping a phishing attack, even when the victims ignore warnings," Microsoft Research (MSR), Tech. Rep. MSR-TR-2005-142, 2005.
    • (2005)
    • Florencio, D.1    Herley, C.2
  • 34
    • 34548150723 scopus 로고    scopus 로고
    • Compartmented security for browsers - or how to thwart a phisher with trusted computing
    • to appear
    • S. Gajek, A.-R. Sadeghi, C. Stueble, and M. Winandy, "Compartmented security for browsers - or how to thwart a phisher with trusted computing," in ARES, 2007, to appear.
    • (2007) ARES
    • Gajek, S.1    Sadeghi, A.-R.2    Stueble, C.3    Winandy, M.4
  • 38
    • 35348834896 scopus 로고    scopus 로고
    • P. J. Leahy, "Anti-phishing Act," 2005, https://www.a-i3.org/ images/stories/recht/us_gesetz.pdf.
    • (2005) Anti-phishing Act
    • Leahy, P.J.1
  • 39
    • 35348910274 scopus 로고    scopus 로고
    • B. H. Office, Fraud Bill HL Bill 7, 2005, https://www.a-i3.org/images/stories/recht/brit_gesetz.pdf.
    • B. H. Office, "Fraud Bill HL Bill 7," 2005, https://www.a-i3.org/images/stories/recht/brit_gesetz.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.