-
1
-
-
34548344520
-
-
Anti-Phishing Working Group: November 2005
-
Anti-Phishing Working Group: Phishing Activity Trends Report November 2005 (2005)
-
(2005)
Phishing Activity Trends Report
-
-
-
2
-
-
33846469356
-
-
Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., Mitchell, J.C.: Client Side Defense Against Web-based Identity Theft, http://crypto.stanford.edu/ SpoofGuard/#publications
-
Client Side Defense Against Web-based Identity Theft
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
4
-
-
33745466910
-
The Battle Against Phishing: Dynamic Security Skins
-
Dhamija, R., Tygar, J.D.: The Battle Against Phishing: Dynamic Security Skins, In: Proc. SOUPS (2005)
-
(2005)
Proc. SOUPS
-
-
Dhamija, R.1
Tygar, J.D.2
-
5
-
-
33745816410
-
-
Dhamija, R., Tygar, J.D., Hearst, M.: Why Phishing Works. In: CHI 2006. Proceedings of the Conference on Human Factors in Computing Systems (to appear)
-
Dhamija, R., Tygar, J.D., Hearst, M.: Why Phishing Works. In: CHI 2006. Proceedings of the Conference on Human Factors in Computing Systems (to appear)
-
-
-
-
6
-
-
77952412681
-
-
Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J., Tauber, E.R.: How Do Users Evaluate the Credibility of Web Sites?: A Study with Over 2,500 Participants. In: Proc. DUX (2003)
-
Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J., Tauber, E.R.: How Do Users Evaluate the Credibility of Web Sites?: A Study with Over 2,500 Participants. In: Proc. DUX (2003)
-
-
-
-
7
-
-
0035034830
-
-
Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., Treinen, M.: What Makes Web Sites Credible?: A Report on a Large Quantitative Study. In: Proc. CHI, pp. 61-68 (2001)
-
Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., Treinen, M.: What Makes Web Sites Credible?: A Report on a Large Quantitative Study. In: Proc. CHI, pp. 61-68 (2001)
-
-
-
-
8
-
-
38549108687
-
-
Alert
-
FTC.gov Alert, http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/altl27. htm
-
FTC.gov
-
-
-
9
-
-
38549104707
-
-
Jakobsson, M.: Modeling and Preventing Phishing Attacks. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, Springer, Heidelberg (2005)
-
Jakobsson, M.: Modeling and Preventing Phishing Attacks. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, Springer, Heidelberg (2005)
-
-
-
-
11
-
-
84889292983
-
-
Jakobsson, M, Myers, S.A, eds, December, ISBN 0-471-78245-9
-
Jakobsson, M., Myers, S.A. (eds.): Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, p. 739 (December 2006) ISBN 0-471-78245-9
-
(2006)
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
, pp. 739
-
-
-
15
-
-
38549168107
-
-
MailFrontier/Sonicwall Phishing, http://www.sonicwall.com/phishing/
-
MailFrontier/Sonicwall Phishing, http://www.sonicwall.com/phishing/
-
-
-
-
19
-
-
38549139786
-
Drive-By Pharming
-
Technical Report TR641, Indiana University December
-
Stamm, S., Ramzan, Z., Jakobsson, M.: Drive-By Pharming. Technical Report TR641, Indiana University (December 2006)
-
(2006)
-
-
Stamm, S.1
Ramzan, Z.2
Jakobsson, M.3
-
20
-
-
38549153004
-
Warkitting: The Drive-by Subversion of Wireless Home Routers. Anti-Phishing and Online Fraud, Part II
-
Special Issue, November
-
Tsow, A., Jakobsson, M., Yang, L., Wetzel, S.: Warkitting: the Drive-by Subversion of Wireless Home Routers. Anti-Phishing and Online Fraud, Part II. Journal of Digital Forensic Practice (Special Issue) 1(3) (November 2006)
-
(2006)
Journal of Digital Forensic Practice
, vol.1
, Issue.3
-
-
Tsow, A.1
Jakobsson, M.2
Yang, L.3
Wetzel, S.4
-
21
-
-
33745851447
-
Do Security Toolbars Actually Prevent Phishing Attacks?
-
Wu, M., Miller, R., Garfinkel, S.: Do Security Toolbars Actually Prevent Phishing Attacks? In: Proc. CHI (2006)
-
(2006)
Proc. CHI
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
|