메뉴 건너뛰기




Volumn , Issue , 2008, Pages

The consequence of non-cooperation in the fight against phishing

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; DATA SHARING; DOMAIN NAMES; MULTIPLE SOURCE; PHISHING; PHISHING ATTACKS;

EID: 67249096586     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ECRIME.2008.4696968     Document Type: Conference Paper
Times cited : (29)

References (26)
  • 1
    • 67249127704 scopus 로고    scopus 로고
    • B. Violino, After phishing? Pharming!, CSO Magazine, October 2005, http://www.csoonline.com/read/100105/pharm.html.
    • B. Violino, "After phishing? Pharming!," CSO Magazine, October 2005, http://www.csoonline.com/read/100105/pharm.html.
  • 3
    • 67249128158 scopus 로고    scopus 로고
    • Cyveillance Inc
    • Cyveillance Inc., "Cyveillance anti-phishing datasheet," 2007, http://www.cyveillance.com/web/docs/AntiPhishing.pdf.
    • (2007) Cyveillance anti-phishing datasheet
  • 4
    • 67249121659 scopus 로고    scopus 로고
    • InternetIdentity Inc
    • InternetIdentity Inc., "PowerShark phishing site deactivation," 2008, http://www.internetidentity.com/phishing-site-takedown.html.
    • (2008) PowerShark phishing site deactivation
  • 6
    • 54249158448 scopus 로고    scopus 로고
    • T. Moore and R. Clayton, Evaluating the wisdom of crowds in assessing phishing websites, in 12th International Financial Cryptography and Data Security Conference (FC08), Springer Lecture Notes on Computer Science (LNCS), 5143, 2008, pp. 16-30.
    • T. Moore and R. Clayton, "Evaluating the wisdom of crowds in assessing phishing websites," in 12th International Financial Cryptography and Data Security Conference (FC08), Springer Lecture Notes on Computer Science (LNCS), vol. 5143, 2008, pp. 16-30.
  • 9
    • 67249118387 scopus 로고    scopus 로고
    • T. Moore and R. Clayton, Evil Searching: compromise and recompromise of Internet hosts for phishing, in submission, 2008.
    • T. Moore and R. Clayton, "Evil Searching: compromise and recompromise of Internet hosts for phishing," in submission, 2008.
  • 12
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • Advances in Information Security, L. J. Camp and S. Lewis, Eds. Boston: Kluwer Academic Publishers
    • H. Varian, "System reliability and free riding," in Economics of Information Security, Vol. 12, Advances in Information Security, L. J. Camp and S. Lewis, Eds. Boston: Kluwer Academic Publishers, 2004, pp. 1-15.
    • (2004) Economics of Information Security , vol.12 , pp. 1-15
    • Varian, H.1
  • 13
    • 67249105614 scopus 로고    scopus 로고
    • 23 April
    • M. Hypponen (private communication), 23 April 2008.
    • (2008)
    • Hypponen, M.1
  • 14
    • 67249152912 scopus 로고    scopus 로고
    • The Register, 6 March, ruling angers industry
    • R. Lemos, "Anti-virus groups fight over Crossover sharing," The Register, 6 March 2006, http://www.theregister.co.uk/2006/03/06/crossover ruling angers industry/.
    • (2006) Anti-virus groups fight over Crossover sharing
    • Lemos, R.1
  • 15
    • 67249114162 scopus 로고    scopus 로고
    • B. Krebs, Defcon speakers team up to fight 'queen bots', Washington Post, 9 August 2006, http://blog.washingtonpost.com/securityfix/2006/ 08/defcon speakers team up to fig.html.
    • B. Krebs, "Defcon speakers team up to fight 'queen bots'," Washington Post, 9 August 2006, http://blog.washingtonpost.com/securityfix/2006/ 08/defcon speakers team up to fig.html.
  • 16
    • 84876278827 scopus 로고    scopus 로고
    • Security Focus Inc
    • Security Focus Inc., "Bugtraq mailing list," http://www.securityfocus. com/archive/1.
    • Bugtraq mailing list
  • 18
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • K. Kannan and R. Telang, "Market for software vulnerabilities? Think again," Management Science, vol. 51, no. 5, 2005, pp. 726-740.
    • (2005) Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 23
    • 30344482454 scopus 로고    scopus 로고
    • Information security: Progress made, but challenges remain to protect federal systems and the nation's critical infrastructures,
    • US General Accounting Office GAO, GAO-03-564T, April
    • R. Dacey, "Information security: Progress made, but challenges remain to protect federal systems and the nation's critical infrastructures, " US General Accounting Office (GAO), GAO-03-564T, April 2003, pp. 1-75.
    • (2003) , pp. 1-75
    • Dacey, R.1
  • 24
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • L. Gordon, M. Loeb and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, vol. 22, no. 6, 2003, pp. 461-485.
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.1    Loeb, M.2    Lucyshyn, W.3
  • 25
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • E. Gal-Or and A. Ghose, "The economic incentives for sharing security information," Information Systems Research, vol. 16, no. 2, 2005, pp. 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 26
    • 0000071449 scopus 로고
    • From weakest-link to best-shot: The voluntary provision of public goods
    • J. Hirshleifer, "From weakest-link to best-shot: the voluntary provision of public goods," Public Choice, vol. 41, 1983, pp. 371-386.
    • (1983) Public Choice , vol.41 , pp. 371-386
    • Hirshleifer, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.