-
1
-
-
51149120136
-
-
Anti-Phishing Working Group, http://www.antiphishing.org/.
-
Group
-
-
-
3
-
-
51149093420
-
-
Gartner Inc., Gartner Says Number of Phishing E-Mails Sent to U.S. Adults Nearly Doubles in Just Two Years, 2006 Press Release, 9 Nov 2006, http://www.gartner, com/it/page, jsp?id=498245.
-
Gartner Inc., "Gartner Says Number of Phishing E-Mails Sent to U.S. Adults Nearly Doubles in Just Two Years, 2006 Press Release, 9 Nov 2006," http://www.gartner, com/it/page, jsp?id=498245.
-
-
-
-
4
-
-
85044841595
-
Client-side defense against web-based identity theft
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. Mitchell, "Client-side defense against web-based identity theft," in Proceedings of Network and Distributed Systems Security (NDSS), 2004.
-
(2004)
Proceedings of Network and Distributed Systems Security (NDSS)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.5
-
5
-
-
51149120317
-
-
Cloudmark Inc
-
Cloudmark Inc., http://www.cloudmark.com/desktop/download/.
-
-
-
-
6
-
-
51149116985
-
-
eBay Inc
-
eBay Inc., "Using eBay Tool's Account Guard," http://pages.eBay.com/help/confidence/accountguard.html.
-
Using eBay Tool's Account Guard
-
-
-
9
-
-
33745479338
-
SPS: A simple filtering algorithm to thwart phishing attacks
-
D. Miyamoto, H. Hazeyama, and Y. Kadobayashi, "SPS: a simple filtering algorithm to thwart phishing attacks," Lecture Notes in Computer Science, vol. 3837, p. 195, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3837
, pp. 195
-
-
Miyamoto, D.1
Hazeyama, H.2
Kadobayashi, Y.3
-
10
-
-
77953070493
-
-
W. Liu, G. Huang, X. Liu, M. Z. and X. Deng, Detection of phishing webpages based on visual similarity, International World Wide Web Conference, pp. 1060-1061, 2005.
-
W. Liu, G. Huang, X. Liu, M. Z. and X. Deng, "Detection of phishing webpages based on visual similarity," International World Wide Web Conference, pp. 1060-1061, 2005.
-
-
-
-
12
-
-
33745469273
-
Towards Collaborative Security and P2P Intrusion Detection
-
M. Locasto, J. Parekh, A. Keromytis, and S. Stolfo, "Towards Collaborative Security and P2P Intrusion Detection," in Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, 2005.
-
(2005)
Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
-
-
Locasto, M.1
Parekh, J.2
Keromytis, A.3
Stolfo, S.4
-
13
-
-
34748814488
-
Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection
-
Germany
-
C. V. Zhou, S. Karunasekera, and C. Leckie, "Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection," in the Tenth IFIP/IEEE International Symposium on Integrated Network Management (IM), Germany, 2007, pp. 80-89.
-
(2007)
the Tenth IFIP/IEEE International Symposium on Integrated Network Management (IM)
, pp. 80-89
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
15
-
-
0012584444
-
-
IBM research
-
IBM research, "Autonomic Computing," http://www.research.ibm. com/autonomic.
-
Autonomic Computing
-
-
-
16
-
-
49949109773
-
-
The Honeynet Project & Research Alliance
-
The Honeynet Project & Research Alliance, "Know Your Enemy: Fast-Flux Service Networks," 2007, http://www.honeynet.org/papers/ff/.
-
(2007)
Know Your Enemy: Fast-Flux Service Networks
-
-
-
17
-
-
33847258726
-
A Peer-to-Peer Collaborative Intrusion Detection System
-
Malaysia
-
C. V. Zhou, S. Karunasekera, and C. Leckie, "A Peer-to-Peer Collaborative Intrusion Detection System," in IEEE International Conference on Networks (ICON), Malaysia, 2005, pp. 118-123.
-
(2005)
IEEE International Conference on Networks (ICON)
, pp. 118-123
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
19
-
-
51149111109
-
-
Anonymizer Inc
-
Anonymizer Inc., http://www.anonymizer.com/.
-
-
-
-
20
-
-
51149098260
-
-
The Free Haven Project
-
The Free Haven Project, http://tor.eff.org/.
-
-
-
-
21
-
-
84898190494
-
Phinding Phish: Evaluating Anti-Phishing Tools
-
San Diego, CA
-
Y. Zhang, S. Egelman, L. Cranor, and J. Hong, "Phinding Phish: Evaluating Anti-Phishing Tools," Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, vol. 28, 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007)
, vol.28
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
22
-
-
34548786769
-
The Emperor's New Security Indicators
-
Washington, DC, USA: IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, "The Emperor's New Security Indicators," in SP'07: Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2007, pp. 51-65.
-
(2007)
SP'07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
24
-
-
84878677819
-
-
Inc
-
Cisco Systems, Inc., "Sampled NetFlow," http://www.cisco.com/ univercd/cc/td/doc/product/software/iosl20/120ne wft/1201imit/120s/120sll/12s. sanf.pdf.
-
Sampled NetFlow
-
-
Systems, C.1
-
25
-
-
51149111563
-
-
PhishTank, http://www.phishtank.com/.
-
PhishTank
-
-
|