메뉴 건너뛰기




Volumn , Issue , 2008, Pages 261-272

Itrustpage: A user-assisted anti-phishing tool

Author keywords

Anti phishing; Phishing

Indexed keywords

ANTI-PHISHING; AUTOMATIC DETECTIONS; EASE OF USE; FALSE NEGATIVES; FALSE POSITIVES; MOZILLA; NEW APPROACHES; PHISHING; PHISHING ATTACKS; RESEARCH COMMUNITIES; USER INPUTS; WEB FORMS; WEB PAGES;

EID: 59249089053     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352592.1352620     Document Type: Conference Paper
Times cited : (12)

References (31)
  • 1
    • 84868886089 scopus 로고    scopus 로고
    • Anti-Phishing Working Group Website, http://www.antiphishing.org/.
    • Group Website
  • 2
    • 59249105451 scopus 로고    scopus 로고
    • Personal Communication, Confidential Source, Canadian Banking Sector. Toronto
    • Personal Communication, 2006. Confidential Source, Canadian Banking Sector. Toronto.
    • (2006)
  • 3
    • 59249095533 scopus 로고    scopus 로고
    • iTrustPage Tool, 2007. http: //www.cs.toronto.edu/~ronda/itrustpage/.
    • iTrustPage Tool, 2007. http: //www.cs.toronto.edu/~ronda/itrustpage/.
  • 18
    • 33645131523 scopus 로고    scopus 로고
    • W. Liu, X. Deng, G. Huang, and A. Fu. An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, 10, No. 2. 58-65, March/April, 2005.
    • W. Liu, X. Deng, G. Huang, and A. Fu. An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, Vol. 10, No. 2. 58-65, March/April, 2005.
  • 24
    • 16444376120 scopus 로고    scopus 로고
    • Two-Factor Authentication: Too Little, Too Late
    • April
    • B. Schneier. Two-Factor Authentication: Too Little, Too Late. Communications of the ACM. Vol. 48, No. 4., April, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.4
    • Schneier, B.1
  • 25
    • 59249083648 scopus 로고    scopus 로고
    • SURBL
    • SURBL. Surbl lists, 2006. http://www.surbl.org/lists.html.
    • (2006) Surbl lists


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.