-
1
-
-
35348820325
-
-
3Sharp, 3Sharp Study finds Internet Explorer 7 Edges Out Netcraft As Most Accurate for Anti-Phishing Protection. 2006. http://www.3sharp.com/projects/ antiphishing/
-
3Sharp, 3Sharp Study finds Internet Explorer 7 Edges Out Netcraft As Most Accurate for Anti-Phishing Protection. 2006. http://www.3sharp.com/projects/ antiphishing/
-
-
-
-
2
-
-
34548344520
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group, Phishing Activity Trends Report. 2006. http://www.antiphishing.org/reports/apwg_report_june_06.pdf
-
(2006)
Phishing Activity Trends Report
-
-
-
3
-
-
84858373097
-
-
Anti-Phishing Working Group APWG, Nov 20
-
Anti-Phishing Working Group (APWG). Visited: Nov 20, 2006. http://www.antiphishing.org/
-
(2006)
Visited
-
-
-
4
-
-
33846469356
-
Client-Side Defense against Web-Based Identity Theft
-
Chou, N., R. Ledesma, Y. Teraguchi, D. Boneh, and J.C. Mitchell. Client-Side Defense against Web-Based Identity Theft. In Proceedings of The 11th Annual Network and Distributed System Security Symposium (NDSS '04). http://crypto.stanford.edu/SpoofGuard/webspoof.pdf
-
Proceedings of The 11th Annual Network and Distributed System Security Symposium (NDSS '04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
5
-
-
84858365479
-
-
Cloudmark Inc. Visited: Nov 20
-
Cloudmark Inc. Visited: Nov 20, 2006. http://www.cloudmark.com/desktop/ download/
-
(2006)
-
-
-
7
-
-
35348884013
-
-
Dao, T., Term frequency-Inverse document frequency implementation in C#, The Code Project - C# Programming. Visited: Nov 20, 2006. http://www. codeproject.com/csharp/tfidf.asp
-
Dao, T., Term frequency-Inverse document frequency implementation in C#, The Code Project - C# Programming. Visited: Nov 20, 2006. http://www. codeproject.com/csharp/tfidf.asp
-
-
-
-
11
-
-
84858371493
-
-
eBay Inc, Spoof Email Tutorial, Nov 20
-
eBay Inc., Spoof Email Tutorial. Visited: Nov 20, 2006. http://pages.ebay.com/education/spooftutorial/
-
(2006)
Visited
-
-
-
12
-
-
84858353722
-
-
eBay Inc, Using eBay Toolbar's Account Guard, Nov 20
-
eBay Inc., Using eBay Toolbar's Account Guard. Visited: Nov 20, 2006. http://pages.ebay.com/help/confidence/account-guard.html
-
(2006)
Visited
-
-
-
13
-
-
35348860590
-
-
Federal Trade Commission, An E-Card for You game. Visited: Nov 20, 2006. http://www.ftc.gov/bcp/conline/ecards/phishing/index.html
-
Federal Trade Commission, An E-Card for You game. Visited: Nov 20, 2006. http://www.ftc.gov/bcp/conline/ecards/phishing/index.html
-
-
-
-
14
-
-
35348841891
-
-
Federal Trade Commission, Federal Trade Commission. Phishing Alerts. Visited: Nov 20, 2006. http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt. htm
-
Federal Trade Commission, Federal Trade Commission. Phishing Alerts. Visited: Nov 20, 2006. http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt. htm
-
-
-
-
15
-
-
35348822468
-
Fostering E-Mail Security Awareness: The West Point Carronade
-
Ferguson, A.J., Fostering E-Mail Security Awareness: The West Point Carronade, EDUCASE Quarterly, 2005. http://www.educause.edu/ir/library/ pdf/eqm0517.pdf
-
(2005)
EDUCASE Quarterly
-
-
Ferguson, A.J.1
-
16
-
-
35348818521
-
Learning to Detect Phishing Emails
-
CMU-ISRI-06-112, 2006
-
Fette, I., N. Sadeh, and A. Tomasic. Learning to Detect Phishing Emails. ISRI Technical Report. CMU-ISRI-06-112, 2006. http://reports-archive.adm.cs.cmu. edu/anon/isri2006/abstracts/06-112.html
-
ISRI Technical Report
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
17
-
-
0003317098
-
How to make personalized web browsing simple, secure, and anonymous
-
Gabber, E., P.B. Gibbons, Y. Matias, and A.J. Mayer. How to make personalized web browsing simple, secure, and anonymous. In Proceedings of Financial Cryptography, pp. 17-32 1997.
-
(1997)
Proceedings of Financial Cryptography
, pp. 17-32
-
-
Gabber, E.1
Gibbons, P.B.2
Matias, Y.3
Mayer, A.J.4
-
18
-
-
84858359083
-
-
GeoTrust Inc, TrustWatch Toolbar, Nov 20
-
GeoTrust Inc., TrustWatch Toolbar. Visited: Nov 20, 2006. http://toolbar.trustwatch.com/tour/v3ie/toolbar-v3ie-tour-overview.html
-
(2006)
Visited
-
-
-
19
-
-
84858344600
-
-
Google Inc, Google Safe Browsing for Firefox, Nov 20
-
Google Inc., Google Safe Browsing for Firefox. Visited: Nov 20, 2006. http://www.google.com/tools/firefox/safebrowsing/
-
(2006)
Visited
-
-
-
21
-
-
35348894790
-
-
Herzberg, A. and A. Gbara, TrustBar: Protecting (even Naive) Web Users from Spoofing and Phishing Attacks. 2004, Cryptology ePrint Archive: Report 2004/155. http://www.cs.biu.ac.il/~herzbea/Papers/ecommerce/spoofing.htm
-
Herzberg, A. and A. Gbara, TrustBar: Protecting (even Naive) Web Users from Spoofing and Phishing Attacks. 2004, Cryptology ePrint Archive: Report 2004/155. http://www.cs.biu.ac.il/~herzbea/Papers/ecommerce/spoofing.htm
-
-
-
-
23
-
-
33745831496
-
-
Jagatic, T., N. Johnson, M. Jakobsson, and F. Menczer, Social Phishing, 2006, http://www.indiana.edu/~phishing/social-network-experiment/phishing- preprint.pdf
-
(2006)
Social Phishing
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
24
-
-
84858364403
-
-
Keizer, G., Phishing Costs Nearly $1 Billion, TechWeb Technology News. Visited: Nov 20, 2006. http://www.techweb.com/wire/ security/164902671
-
Keizer, G., Phishing Costs Nearly $1 Billion, TechWeb Technology News. Visited: Nov 20, 2006. http://www.techweb.com/wire/ security/164902671
-
-
-
-
25
-
-
35348906237
-
Protecting People from Phishing: The Design and Evaluation of an Embedded. Training Email System
-
Kumaraguru, P., Y.W. Rhee, A. Acquisti, L. Cranor, and J. Hong. Protecting People from Phishing: The Design and Evaluation of an Embedded. Training Email System. In Proceedings of CHI2007.
-
Proceedings of CHI2007
-
-
Kumaraguru, P.1
Rhee, Y.W.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
-
27
-
-
84858371560
-
Gartner: Consumers to lose $2.8 billion to phishers in 2006
-
McMillan, R., Gartner: Consumers to lose $2.8 billion to phishers in 2006, NetworkWorid, 2006. http://www.network.world.com/news/2006/ 110906-gartner-consumers-to-lose-28b.html
-
(2006)
NetworkWorid
-
-
McMillan, R.1
-
29
-
-
35348927909
-
-
Netcraft, Netcraft Anti-Phishing Toolbar. Visited: Nov 20, 2006. http://toolbar.netcraft.com/
-
Netcraft, Netcraft Anti-Phishing Toolbar. Visited: Nov 20, 2006. http://toolbar.netcraft.com/
-
-
-
-
30
-
-
35348826688
-
Gone Phishing
-
New York State Office of Cyber Security & Critical Infrastructure Coordination, Aggregate Exercise Results for public release
-
New York State Office of Cyber Security & Critical Infrastructure Coordination. 2005. Gone Phishing... A Briefing on the Anti-Phishing Exercise Initiative for New York State Government. Aggregate Exercise Results for public release.
-
(2005)
A Briefing on the Anti-Phishing Exercise Initiative for New York State Government
-
-
-
31
-
-
35348849911
-
-
Panahy, A., Google Parser, The Code Project - C# Programming. Visited: Nov 20, 2006. http://www.codeproject.com/csharp/googleparser.asp
-
Panahy, A., Google Parser, The Code Project - C# Programming. Visited: Nov 20, 2006. http://www.codeproject.com/csharp/googleparser.asp
-
-
-
-
32
-
-
2442493808
-
Robust Hyperlinks and Locations
-
Phelps, T.A. and R. Wilensky, Robust Hyperlinks and Locations, D-Lib Magazine, vol. 6(7/8), 2000. http://www.dlib.org/dlib/july00/wilensky/ 07wilensky.html
-
(2000)
D-Lib Magazine
, vol.6
, Issue.7-8
-
-
Phelps, T.A.1
Wilensky, R.2
-
33
-
-
84858364713
-
-
Nov 20
-
PhishTank. Visited: Nov 20, 2006. http://www.phishtank.com/
-
(2006)
Visited
-
-
PhishTank1
-
34
-
-
35348867834
-
-
PhishTank, Statistics about Phishing Activity and PhishTank Usage. Visited: Nov 20, 2006. http://www.phishtank.com/stats/2006/10/
-
PhishTank, Statistics about Phishing Activity and PhishTank Usage. Visited: Nov 20, 2006. http://www.phishtank.com/stats/2006/10/
-
-
-
-
36
-
-
35348864122
-
-
Stanford Applied Crypto Group, PwdHash. Visited: Nov 20, 2006. http://crypto.stanford.edu/PwdHash
-
Stanford Applied Crypto Group, PwdHash. Visited: Nov 20, 2006. http://crypto.stanford.edu/PwdHash
-
-
-
-
37
-
-
33745867321
-
Do Security Toolbars Actually Prevent Phishing Attacks?
-
Quebec, Canada: ACM Press. pp, April
-
Wu, M., R. Miller, and S. Garfinkel. Do Security Toolbars Actually Prevent Phishing Attacks? In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2006), CHI Letters 8(1). Quebec, Canada: ACM Press. pp. 601-610, April 2006.
-
(2006)
Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2006), CHI Letters 8(1)
, pp. 601-610
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
-
39
-
-
23244459906
-
Trusted paths for browsers
-
Ye, Z., S. Smith, and D. Anthony, Trusted paths for browsers. ACM Transactions on Information and System Security 2005. 8(2): p. 153-186.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.1
Smith, S.2
Anthony, D.3
-
41
-
-
35348904244
-
-
Zolnikov, P., Extending Explorer with Band. Objects using.NET and Windows Forms, The Code Project - C# Programming. Visited: Nov 20, 2006. http://www.codeproject.com/csharp/dotnetband.objects.asp
-
Zolnikov, P., Extending Explorer with Band. Objects using.NET and Windows Forms, The Code Project - C# Programming. Visited: Nov 20, 2006. http://www.codeproject.com/csharp/dotnetband.objects.asp
-
-
-
|