-
1
-
-
84868886089
-
-
Anti-Phishing Working Group Website, http://www.antiphishing.org/.
-
Group Website
-
-
-
2
-
-
59249105451
-
-
Personal Communication, Confidential Source, Canadian Banking Sector. Toronto
-
Personal Communication, 2006. Confidential Source, Canadian Banking Sector. Toronto.
-
(2006)
-
-
-
3
-
-
59249095533
-
-
iTrustPage Tool, 2007. http: //www.cs.toronto.edu/~ronda/itrustpage/.
-
iTrustPage Tool, 2007. http: //www.cs.toronto.edu/~ronda/itrustpage/.
-
-
-
-
4
-
-
33845989821
-
Can Machine Learning Be Secure?
-
Taipei, Taiwan, March
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can Machine Learning Be Secure? In Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS), Taipei, Taiwan, March 2006.
-
(2006)
Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS)
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
9
-
-
35348913799
-
Learning to Detect Phishing Emails
-
Banff, Alberta, Canada, May
-
I. Fette, N. Sadeh, and A. Tomasic. Learning to Detect Phishing Emails. In Proceedings of the International World Wide Web Conference (WWW), Banff, Alberta, Canada, May 2007.
-
(2007)
Proceedings of the International World Wide Web Conference (WWW)
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
17
-
-
34848911641
-
Social Phishing
-
October
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social Phishing. Communications of the ACM. Vol. 50, No. 10., October, 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
18
-
-
33645131523
-
-
W. Liu, X. Deng, G. Huang, and A. Fu. An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, 10, No. 2. 58-65, March/April, 2005.
-
W. Liu, X. Deng, G. Huang, and A. Fu. An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, Vol. 10, No. 2. 58-65, March/April, 2005.
-
-
-
-
23
-
-
84863469085
-
Stronger Password Authentication Using Browser Extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell. Stronger Password Authentication Using Browser Extensions. In Proceedings of the Usenix Security Symposium, April, 2005.
-
(2005)
Proceedings of the Usenix Security Symposium, April
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
24
-
-
16444376120
-
Two-Factor Authentication: Too Little, Too Late
-
April
-
B. Schneier. Two-Factor Authentication: Too Little, Too Late. Communications of the ACM. Vol. 48, No. 4., April, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
-
-
Schneier, B.1
-
25
-
-
59249083648
-
-
SURBL
-
SURBL. Surbl lists, 2006. http://www.surbl.org/lists.html.
-
(2006)
Surbl lists
-
-
-
30
-
-
84898190494
-
Phinding Phish: An Evaluation of Anti-Phishing Toolbars
-
San Diego, California, USA, February
-
Y. Zhang, S. Egelman, L. Cranor, and J. Hong. Phinding Phish: An Evaluation of Anti-Phishing Toolbars. In Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2007.
-
(2007)
Network and Distributed System Security Symposium (NDSS)
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
31
-
-
35348905575
-
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites
-
Banff, Alberta, Canada, May
-
Y. Zhang, J. Hong, and L. Cranor. CANTINA: A Content-Based Approach to Detecting Phishing Web Sites. In Proceedings of the International World Wide Web Conference (WWW), Banff, Alberta, Canada, May 2007.
-
(2007)
Proceedings of the International World Wide Web Conference (WWW)
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
|