메뉴 건너뛰기




Volumn 5143 LNCS, Issue , 2008, Pages 16-30

Evaluating the wisdom of crowds in assessing phishing Websites

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; LAWS AND LEGISLATION; WORLD WIDE WEB;

EID: 54249158448     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85230-8_2     Document Type: Conference Paper
Times cited : (60)

References (28)
  • 2
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • Albert, R., Jeong, H., Barabási, A.: Error and attack tolerance of complex networks. Nature 406, 378-382 (2000)
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabási, A.3
  • 3
    • 0012782386 scopus 로고
    • Information cascades in the laboratory
    • Anderson, L., Holt, C.: Information cascades in the laboratory. American Economic Review 87(5), 847-862 (1995)
    • (1995) American Economic Review , vol.87 , Issue.5 , pp. 847-862
    • Anderson, L.1    Holt, C.2
  • 4
    • 0029700344 scopus 로고    scopus 로고
    • Decentralized trust management
    • S&P, pp, IEEE Computer Society, Los Alamitos
    • Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy (S&P), pp. 164-173. IEEE Computer Society, Los Alamitos (1996)
    • (1996) IEEE Symposium on Security and Privacy , pp. 164-173
    • Blaze, M.1    Feigenbaum, J.2    Lacy, J.3
  • 7
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 8
    • 34547925203 scopus 로고    scopus 로고
    • Herdict: A distributed model for threats online
    • Bradbury, D, ed, Elsevier, Oxford
    • Hwang, T.: Herdict: a distributed model for threats online. In: Bradbury, D. (ed.) Network Security, pp. 15-18. Elsevier, Oxford (2007)
    • (2007) Network Security , pp. 15-18
    • Hwang, T.1
  • 9
    • 54249144163 scopus 로고    scopus 로고
    • Kahney, L.: Cheaters bow to peer pressure. Wired (February 15, 2001), http://www.wired.com/news/technology/0,1282,41838,00.html
    • Kahney, L.: Cheaters bow to peer pressure. Wired (February 15, 2001), http://www.wired.com/news/technology/0,1282,41838,00.html
  • 10
    • 84880467894 scopus 로고    scopus 로고
    • The EigenTrust algorithm for reputation management in P2P networks
    • ACM Press, New York
    • Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: 12th WWW, pp. 640-651. ACM Press, New York (2003)
    • (2003) 12th WWW , pp. 640-651
    • Kamvar, S.1    Schlosser, M.2    Garcia-Molina, H.3
  • 12
    • 54249115161 scopus 로고    scopus 로고
    • Online thugs assault sites that specialize in security help
    • September 11, 2007
    • Larkin, E.: Online thugs assault sites that specialize in security help. PC World (September 11, 2007), http://www.pcworld.com/businesscenter/article/ 137084/online_thugs_assault_sites_that_specialize_in_security_help_.html
    • PC World
    • Larkin, E.1
  • 13
    • 3042659976 scopus 로고    scopus 로고
    • PhD thesis draft, University of California at Berkeley
    • Levien, R.: Attack resistant trust metrics. PhD thesis (draft), University of California at Berkeley (2004)
    • (2004) Attack resistant trust metrics
    • Levien, R.1
  • 14
    • 54249138363 scopus 로고    scopus 로고
    • Rock Phish' blamed for surge in phishing
    • December 12, 2006
    • McMillan, R.: 'Rock Phish' blamed for surge in phishing. InfoWorld (December 12, 2006), http://www.infoworld.com/article/06/12/12/HNrockphish_1. html
    • InfoWorld
    • McMillan, R.1
  • 16
    • 24744469980 scopus 로고    scopus 로고
    • Power laws, Pareto distributions and Zipf's law
    • Newman, M.: Power laws, Pareto distributions and Zipf's law. Contemporary Physics 46(5), 323-351 (2005)
    • (2005) Contemporary Physics , vol.46 , Issue.5 , pp. 323-351
    • Newman, M.1
  • 17
  • 18
    • 54249115646 scopus 로고    scopus 로고
    • PhishTank: http://www.phishtank.com/
    • PhishTank
  • 20
  • 23
    • 54249112525 scopus 로고    scopus 로고
    • Stop Badware: http://www.stopbadware.org
    • Stop Badware
  • 24
    • 84858471334 scopus 로고    scopus 로고
    • Vipul's Razor: http://razor.sourceforge.net
    • Razor
    • Vipul's1
  • 26
    • 77953910522 scopus 로고    scopus 로고
    • Fishing for phishes: Applying capture-recapture to phishing
    • ACM Press, New York
    • Weaver, R., Collins, M.: Fishing for phishes: applying capture-recapture to phishing. In: APWG eCrime, pp. 14-25. ACM Press, New York (2007)
    • (2007) APWG eCrime , pp. 14-25
    • Weaver, R.1    Collins, M.2
  • 27
    • 35348926088 scopus 로고    scopus 로고
    • Expertise networks in online communities: Structure and algorithms
    • ACM Press, New York
    • Zhang, J., Ackerman, M., Adamic, L.: Expertise networks in online communities: structure and algorithms. In: 16th WWW, pp. 221-230. ACM Press, New York (2007)
    • (2007) 16th WWW , pp. 221-230
    • Zhang, J.1    Ackerman, M.2    Adamic, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.