메뉴 건너뛰기




Volumn 262, Issue , 2008, Pages 23-35

A forensic framework for tracing phishers

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SCIENCE; EDUCATION;

EID: 45949097266     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-79026-8_2     Document Type: Conference Paper
Times cited : (13)

References (21)
  • 3
    • 35048886013 scopus 로고    scopus 로고
    • A robust classifier for passive TCP/IP fingerprinting
    • Passive and Active Network Measurement
    • R. Beverly. A robust classifier for passive TCP/IP fingerprinting. In Passive and Active Network Measurement, LNCS, pages 158-167, 2004.
    • (2004) LNCS , pp. 158-167
    • Beverly, R.1
  • 5
    • 33845926633 scopus 로고    scopus 로고
    • Phoney: Mimicking user response to detect phishing attacks
    • 0:668-672
    • M. Chandrasekaran, R. Chinchani, and S. Upadhyaya. Phoney: Mimicking user response to detect phishing attacks. wowmom, 0:668-672, 2006.
    • (2006) wowmom
    • Chandrasekaran, M.1    Chinchani, R.2    Upadhyaya, S.3
  • 6
    • 45949102509 scopus 로고    scopus 로고
    • T. Fawcett and F. Provost. Fraud detection. In W. Kloesgen and J. Zytkow, editors, Handbook of Knowledge Discovery and Data Mining. Oxford University Press, 2002. CeDER Working Paper #IS-99-18, Stern School of Business, New York University, NY, NY 10012.
    • T. Fawcett and F. Provost. Fraud detection. In W. Kloesgen and J. Zytkow, editors, Handbook of Knowledge Discovery and Data Mining. Oxford University Press, 2002. CeDER Working Paper #IS-99-18, Stern School of Business, New York University, NY, NY 10012.
  • 7
    • 34548172244 scopus 로고    scopus 로고
    • Stopping a Phishing Attack, Even when the Victims IgnoreWarnings
    • Technical Report MSR-TR-2005-142, Microsoft Research MSR
    • D. Florencio and C. Herley. Stopping a Phishing Attack, Even when the Victims IgnoreWarnings. Technical Report MSR-TR-2005-142, Microsoft Research (MSR), 2005.
    • (2005)
    • Florencio, D.1    Herley, C.2
  • 9
    • 45949099153 scopus 로고    scopus 로고
    • Increased Phishing and Online Attacks Cause Dip in Consumer Confidence
    • June
    • A. Litan. Increased Phishing and Online Attacks Cause Dip in Consumer Confidence. Gartner Study, June 2005.
    • (2005) Gartner Study
    • Litan, A.1
  • 10
    • 45949093378 scopus 로고    scopus 로고
    • Phishing Attacks Leapfrog Despite Attempts to Stop Them
    • November
    • A. Litan. Phishing Attacks Leapfrog Despite Attempts to Stop Them. Gartner Study, November 2006.
    • (2006) Gartner Study
    • Litan, A.1
  • 11
    • 45949105507 scopus 로고    scopus 로고
    • Honey tokens and web bugs: Developing reactive techniques for investigating phishing scams
    • C. M. McRae, R. W. McGrew, and R. B. Vaughn. Honey tokens and web bugs: Developing reactive techniques for investigating phishing scams. Digital Forensic Practice, 1(3):193-199, 2006.
    • (2006) Digital Forensic Practice , vol.1 , Issue.3 , pp. 193-199
    • McRae, C.M.1    McGrew, R.W.2    Vaughn, R.B.3
  • 14
    • 0013238179 scopus 로고    scopus 로고
    • On high-performance web crawling
    • Technical report, Compaq Systems Research Center
    • M. Najork and A. Heydon. On high-performance web crawling. Technical report, Compaq Systems Research Center, 2001.
    • (2001)
    • Najork, M.1    Heydon, A.2
  • 15
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput. Commun. Rev., 31(3):38-47, 2001.
    • (2001) SIGCOMM Comput. Commun. Rev , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 16
    • 0442296744 scopus 로고    scopus 로고
    • A bayesian paradigm for designing intrusion detection systems
    • S. L. Scott. A bayesian paradigm for designing intrusion detection systems. Computational Statistics & Data Analysis, 45(1 :69-83, 2004.
    • (2004) Computational Statistics & Data Analysis , vol.45 , Issue.1 , pp. 69-83
    • Scott, S.L.1
  • 19
    • 45949099918 scopus 로고    scopus 로고
    • M. J. T. Jagatic, N. Johnson and F. Menczer. Social phishing, 2007. To appear in Communications of the ACM.
    • M. J. T. Jagatic, N. Johnson and F. Menczer. Social phishing, 2007. To appear in Communications of the ACM.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.