메뉴 건너뛰기




Volumn 5075 LNCS, Issue , 2008, Pages 21-31

Method for evaluating the security risk of a website against phishing attacks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER CRIME; INTERSYMBOL INTERFERENCE; LIFE CYCLE; RISK PERCEPTION; RISKS; WORLD WIDE WEB; INTERNET; LOSSES; MALWARE;

EID: 45849130178     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-69304-8_3     Document Type: Conference Paper
Times cited : (10)

References (20)
  • 1
    • 45849150041 scopus 로고    scopus 로고
    • Anti-Phishing Working Group APWG
    • Anti-Phishing Working Group (APWG) (2008), http://www.antiphishing.org
    • (2008)
  • 2
    • 33745816410 scopus 로고    scopus 로고
    • Tygar, J.D., Dhamija, R., Hearst, M.: Why Phishing Works. In: Proc. of the Conference on Human Factors in Computing Systems (CHI 2006) (2006)
    • Tygar, J.D., Dhamija, R., Hearst, M.: Why Phishing Works. In: Proc. of the Conference on Human Factors in Computing Systems (CHI 2006) (2006)
  • 5
    • 45849120629 scopus 로고    scopus 로고
    • Mutual Internet Practices Association
    • Mutual Internet Practices Association, DomainKeys Identified Mail (DKIM) (2008), http://www.dkim.org
    • (2008) DomainKeys Identified Mail (DKIM)
  • 7
    • 25144519584 scopus 로고    scopus 로고
    • Phish and Hips: Human Interactive Proofs to Detect Phishing Attacks
    • Dhamija, R., Tygar, J.D.: Phish and Hips: Human Interactive Proofs to Detect Phishing Attacks. In: Proc. of the Second International Workshop, pp. 127-141 (2005)
    • (2005) Proc. of the Second International Workshop , pp. 127-141
    • Dhamija, R.1    Tygar, J.D.2
  • 8
    • 33751538239 scopus 로고    scopus 로고
    • Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
    • Fu, A.Y., Wenyin, L., Deng, X.: Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). IEEE Transactions on Dependable and Secure Computing 3(4), 301-311 (2006)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 301-311
    • Fu, A.Y.1    Wenyin, L.2    Deng, X.3
  • 9
    • 33645131523 scopus 로고    scopus 로고
    • An Antiphishing Strategy Based on Visual Similarity Assessment
    • Liu, W., Deng, X., Huang, G., Fu, A.Y.: An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, 58-65 (2006)
    • (2006) IEEE Internet Computing , vol.58-65
    • Liu, W.1    Deng, X.2    Huang, G.3    Fu, A.Y.4
  • 12
    • 45849130950 scopus 로고    scopus 로고
    • TrustWatch
    • TrustWatch (2008), http://www.trustwatch.com
    • (2008)
  • 13
    • 45849119083 scopus 로고    scopus 로고
    • NetCraft
    • NetCraft (2008), http://www.netcraft.com
    • (2008)
  • 14
    • 45849126157 scopus 로고    scopus 로고
    • EarthLink
    • EarthLink (2008), http://www.earthlink.com
    • (2008)
  • 15
    • 45849112908 scopus 로고    scopus 로고
    • Microsoft, http://www.microsoft.com/mscorp/safety/technologies/ antiphishing/
  • 16
  • 17
    • 45849114408 scopus 로고    scopus 로고
    • Emigh, A.: Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures. ITTC Report on Online. Identity Theft Technology and Countermeasures (2005)
    • Emigh, A.: Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures. ITTC Report on Online. Identity Theft Technology and Countermeasures (2005)
  • 18
    • 45849088081 scopus 로고    scopus 로고
    • Rankey (2008), http://www.ranky.com
    • (2008)
    • Rankey1
  • 19
    • 45849146172 scopus 로고    scopus 로고
    • Alexa the Web Information Company
    • Alexa the Web Information Company (2008), http://www.alexa.com
    • (2008)
  • 20
    • 45849104617 scopus 로고    scopus 로고
    • Korea Information Security Agency KISA
    • Korea Information Security Agency (KISA) (2008), http://www.kisa.or.kr
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.