-
3
-
-
35048886013
-
A robust classifier for passive TCP/IP fingerprinting
-
Passive and Active Network Measurement
-
R. Beverly. A robust classifier for passive TCP/IP fingerprinting. In Passive and Active Network Measurement, LNCS, pages 158-167, 2004.
-
(2004)
LNCS
, pp. 158-167
-
-
Beverly, R.1
-
5
-
-
33845926633
-
Phoney: Mimicking user response to detect phishing attacks
-
0:668-672
-
M. Chandrasekaran, R. Chinchani, and S. Upadhyaya. Phoney: Mimicking user response to detect phishing attacks. wowmom, 0:668-672, 2006.
-
(2006)
wowmom
-
-
Chandrasekaran, M.1
Chinchani, R.2
Upadhyaya, S.3
-
6
-
-
45949102509
-
-
T. Fawcett and F. Provost. Fraud detection. In W. Kloesgen and J. Zytkow, editors, Handbook of Knowledge Discovery and Data Mining. Oxford University Press, 2002. CeDER Working Paper #IS-99-18, Stern School of Business, New York University, NY, NY 10012.
-
T. Fawcett and F. Provost. Fraud detection. In W. Kloesgen and J. Zytkow, editors, Handbook of Knowledge Discovery and Data Mining. Oxford University Press, 2002. CeDER Working Paper #IS-99-18, Stern School of Business, New York University, NY, NY 10012.
-
-
-
-
7
-
-
34548172244
-
Stopping a Phishing Attack, Even when the Victims IgnoreWarnings
-
Technical Report MSR-TR-2005-142, Microsoft Research MSR
-
D. Florencio and C. Herley. Stopping a Phishing Attack, Even when the Victims IgnoreWarnings. Technical Report MSR-TR-2005-142, Microsoft Research (MSR), 2005.
-
(2005)
-
-
Florencio, D.1
Herley, C.2
-
8
-
-
24344507334
-
Remote physical device fingerprintin
-
T. Kohno, A. Broido, and K. C. Claffy. Remote physical device fingerprintin. IEEE Trans. Dependable Sec. Comput, 2(2):93-108, 2005.
-
(2005)
IEEE Trans. Dependable Sec. Comput
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
9
-
-
45949099153
-
Increased Phishing and Online Attacks Cause Dip in Consumer Confidence
-
June
-
A. Litan. Increased Phishing and Online Attacks Cause Dip in Consumer Confidence. Gartner Study, June 2005.
-
(2005)
Gartner Study
-
-
Litan, A.1
-
10
-
-
45949093378
-
Phishing Attacks Leapfrog Despite Attempts to Stop Them
-
November
-
A. Litan. Phishing Attacks Leapfrog Despite Attempts to Stop Them. Gartner Study, November 2006.
-
(2006)
Gartner Study
-
-
Litan, A.1
-
11
-
-
45949105507
-
Honey tokens and web bugs: Developing reactive techniques for investigating phishing scams
-
C. M. McRae, R. W. McGrew, and R. B. Vaughn. Honey tokens and web bugs: Developing reactive techniques for investigating phishing scams. Digital Forensic Practice, 1(3):193-199, 2006.
-
(2006)
Digital Forensic Practice
, vol.1
, Issue.3
, pp. 193-199
-
-
McRae, C.M.1
McGrew, R.W.2
Vaughn, R.B.3
-
14
-
-
0013238179
-
On high-performance web crawling
-
Technical report, Compaq Systems Research Center
-
M. Najork and A. Heydon. On high-performance web crawling. Technical report, Compaq Systems Research Center, 2001.
-
(2001)
-
-
Najork, M.1
Heydon, A.2
-
15
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput. Commun. Rev., 31(3):38-47, 2001.
-
(2001)
SIGCOMM Comput. Commun. Rev
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
16
-
-
0442296744
-
A bayesian paradigm for designing intrusion detection systems
-
S. L. Scott. A bayesian paradigm for designing intrusion detection systems. Computational Statistics & Data Analysis, 45(1 :69-83, 2004.
-
(2004)
Computational Statistics & Data Analysis
, vol.45
, Issue.1
, pp. 69-83
-
-
Scott, S.L.1
-
19
-
-
45949099918
-
-
M. J. T. Jagatic, N. Johnson and F. Menczer. Social phishing, 2007. To appear in Communications of the ACM.
-
M. J. T. Jagatic, N. Johnson and F. Menczer. Social phishing, 2007. To appear in Communications of the ACM.
-
-
-
|