-
1
-
-
84900330653
-
Phishing Activity Trends - Report for the Month of December, 2007
-
APWG, Technical report, Anti Phishing Working Group, Jan, Available at
-
APWG. Phishing Activity Trends - Report for the Month of December, 2007. Technical report, Anti Phishing Working Group, Jan. 2008. Available at http://www.antiphishing.org/reports/apwg-report-dec-2007.pdf.
-
(2008)
-
-
-
2
-
-
33947362522
-
Image analysis for efficient categorization of image-based spam e-mail
-
29 Aug.-1 Sept
-
H. Aradhye, G. Myers, and J. Herson. Image analysis for efficient categorization of image-based spam e-mail. Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on, 2:914-918, 29 Aug.-1 Sept. 2005.
-
(2005)
Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on
, vol.2
, pp. 914-918
-
-
Aradhye, H.1
Myers, G.2
Herson, J.3
-
3
-
-
33846469356
-
Client-side defense against web-based identity theft
-
San Diego
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. Mitchell. Client-side defense against web-based identity theft. In 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, 2005.
-
(2005)
11th Annual Network and Distributed System Security Symposium (NDSS '04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.5
-
6
-
-
34248554408
-
-
E. Kirda and C. Kruegel. Protecting Users Against Phishing Attacks with AntiPhish. In COMPSAC '05: Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC'05) 1, pages 517-524, Washington, DC, USA, 2005. IEEE Computer Society
-
E. Kirda and C. Kruegel. Protecting Users Against Phishing Attacks with AntiPhish. In COMPSAC '05: Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC'05) Volume 1, pages 517-524, Washington, DC, USA, 2005. IEEE Computer Society.
-
-
-
-
8
-
-
80955123619
-
Visual-Similarity-Based Phishing Detection
-
Technical Report, TR-iSecLab-0708-001
-
E. Medvet, E. Kirda, and C. Kruegel. Visual-Similarity-Based Phishing Detection. Technical Report, TR-iSecLab-0708-001, http://iseclab.org/papers/ visual-phishing-technical.pdf, 2008.
-
(2008)
-
-
Medvet, E.1
Kirda, E.2
Kruegel, C.3
-
9
-
-
37849019549
-
-
ID Home
-
Microsoft. Sender ID Home Page. http://www.microsoft.com/mscorp/safety/ technologies/senderid/default.mspx, 2008.
-
(2008)
Microsoft. Sender
-
-
-
10
-
-
70249107395
-
-
P. Mutton. Italian Bank's XSS Opportunity Seized by Fraudsters. Technical report, Netcraft, Jan. 2008. Available at http://news.netcraft.com/archives/ 2008/01/08/italian-banks-xss-opportunity-seized-by-fraudsters.html.
-
P. Mutton. Italian Bank's XSS Opportunity Seized by Fraudsters. Technical report, Netcraft, Jan. 2008. Available at http://news.netcraft.com/archives/ 2008/01/08/italian-banks-xss-opportunity-seized-by-fraudsters.html.
-
-
-
-
13
-
-
25144524330
-
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. A Browser Plug-In Solution to the Unique Password Problem. http://crypto.stanford.edu/ PwdHash/, 2005.
-
(2005)
Plug-In Solution to the Unique Password Problem
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
Browser, A.6
-
14
-
-
84863469085
-
Stronger Password Authentication Using Browser Extensions
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger Password Authentication Using Browser Extensions. In 14th Usenix Security Symposium, 2005.
-
(2005)
14th Usenix Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
15
-
-
51349093651
-
-
Documentation
-
F. Schneider, N. Provos, R. Moll, M. Chew, and B. Rakowski. Phishing Protection Design Documentation. http://wiki.mozilla.org/Phishing-Protection:- Design-Documentation, 2007.
-
(2007)
Phishing Protection Design Documentation
-
-
Schneider, F.1
Provos, N.2
Moll, R.3
Chew, M.4
Rakowski, B.5
-
16
-
-
70249148852
-
-
Sophos. Do-it-yourself phishing kits found on the internet, reveals Sophos. Technical report, Sophos, Aug. 2004. Available at http://www.sophos.com/ pressoffice/news/articles/2004/08/sa-diyphishing.html.
-
Sophos. Do-it-yourself phishing kits found on the internet, reveals Sophos. Technical report, Sophos, Aug. 2004. Available at http://www.sophos.com/ pressoffice/news/articles/2004/08/sa-diyphishing.html.
-
-
-
-
19
-
-
84904804970
-
Filtering Image Spam with Near-Duplicate Detection
-
Aug
-
Z. Wang, W. Josephson, Q. Lv, M. Charikar, and K. Li. Filtering Image Spam with Near-Duplicate Detection. Proceedings of CEAS 2007: Fourth Conference on Email and Anti-Spam, Aug., 2007.
-
(2007)
Proceedings of CEAS 2007: Fourth Conference on Email and Anti-Spam
-
-
Wang, Z.1
Josephson, W.2
Lv, Q.3
Charikar, M.4
Li, K.5
-
20
-
-
77953070493
-
Detection of phishing webpages based on visual similarity
-
L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng. Detection of phishing webpages based on visual similarity. In 14th International Conference on World Wide Web (WWW): Special Interest Tracks and Posters, 2005.
-
(2005)
14th International Conference on World Wide Web (WWW): Special Interest Tracks and Posters
-
-
Wenyin, L.1
Huang, G.2
Xiaoyue, L.3
Min, Z.4
Deng, X.5
-
21
-
-
70249133218
-
-
Yahoo. Yahoo! AntiSpam Resource Center. http://antispam.yahoo.com/ domainkeys, 2008.
-
Yahoo. Yahoo! AntiSpam Resource Center. http://antispam.yahoo.com/ domainkeys, 2008.
-
-
-
|