-
1
-
-
70349334973
-
-
http://home.versatel.nl/MAvanEverdingen/Code/.
-
-
-
-
4
-
-
28144458701
-
The economy of phishing: A survey of the operations of the phishing market
-
C. Abad. The economy of phishing: A survey of the operations of the phishing market. First Monday, 10(9), 2005.
-
(2005)
First Monday
, vol.10
, Issue.9
-
-
Abad, C.1
-
5
-
-
84904820448
-
Spamato-an extendable Spam filter system
-
USA, July
-
K. Albrecht, N. Burri, and R. Wattenhofer. Spamato-An Extendable Spam Filter System. In 2nd Conference on Email and Anti-Spam (CEAS), Stanford University, Palo Alto, California, USA, July 2005.
-
(2005)
2nd Conference on Email and Anti-Spam (CEAS), Stanford University, Palo Alto, California
-
-
Albrecht, K.1
Burri, N.2
Wattenhofer, R.3
-
7
-
-
77957942936
-
Mimicking user response to prevent phishing attacks
-
M. Chandrasekaran, R. Chinchain, and S. Upadhyaya. Mimicking user response to prevent phishing attacks. In IEEE International Symposium on a World of Wireless, Mobile, and Multimedia networks, 2006.
-
(2006)
IEEE International Symposium on a World of Wireless, Mobile, and Multimedia Networks
-
-
Chandrasekaran, M.1
Chinchain, R.2
Upadhyaya, S.3
-
8
-
-
85044841595
-
Client-side defense against web-based identity theft
-
February
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. C. Mitchell. Client-side defense against web-based identity theft. In NDSS '04: Proceedings of the 11th Annual Network and Distributed System Security Symposium, February 2004.
-
(2004)
NDSS '04: Proceedings of the 11th Annual Network and Distributed System Security Symposium
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
11
-
-
35348913799
-
Learning to detect phishing emails
-
New York, NY, USA, ACM Press
-
I. Fette, N. Sadeh, and A. Tomasic. Learning to detect phishing emails. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 649-656, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
12
-
-
35348884906
-
A large-scale study of web password habits
-
New York, NY, USA, ACM Press
-
D. Florencio and C. Herley. A large-scale study of web password habits. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 657-666, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
13
-
-
70349318955
-
Better website identification and extended validation certifi-cates in ie7 and other browsers
-
November
-
R. Franco. Better website identification and extended validation certifi-cates in ie7 and other browsers. IEBlog, November 2005.
-
(2005)
IEBlog
-
-
Franco, R.1
-
14
-
-
33745504797
-
Xml user interface language (xul) 1.0
-
B. Goodger, I. Hickson, D. Hyatt, and C. Waterson. Xml user interface language (xul) 1.0. Technical report, Mozilla Org., 2001.
-
(2001)
Technical Report, Mozilla Org.
-
-
Goodger, B.1
Hickson, I.2
Hyatt, D.3
Waterson, C.4
-
15
-
-
70349305841
-
Ietf-draft: Requirements for web authentication resistant to phishing
-
S. Hartman. Ietf-draft: Requirements for web authentication resistant to phishing. Technical report, MIT, 2007.
-
(2007)
Technical Report MIT
-
-
Hartman, S.1
-
20
-
-
51849146436
-
What instills trust? a qualitative study of phishing
-
M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y.-K. Lim. What instills trust? a qualitative study of phishing. In Extended abstract, USEC '07, 2007.
-
(2007)
Extended abstract, USEC'07
-
-
Jakobsson, M.1
Tsow, A.2
Shah, A.3
Blevis, E.4
Lim, Y.-K.5
-
21
-
-
70349305840
-
-
P. A. Johnston. *http://pajhome.org.uk/crypt/index.html.
-
-
-
Johnston, P.A.1
-
22
-
-
70349320855
-
Toolkit: E-commerce loses big because of security concerns
-
A. Litan. Toolkit: E-commerce loses big because of security concerns. Technical report, Garnter Research, 2006.
-
(2006)
Technical report, Garnter Research
-
-
Litan, A.1
-
23
-
-
74549125111
-
Gartner survey shows phishing attacks escalated in 2007; more than $3 billion lost to these attacks
-
T. McCall. Gartner survey shows phishing attacks escalated in 2007; more than $3 billion lost to these attacks. Technical report, Gartner Research, 2007.
-
(2007)
Technical report, Gartner Research
-
-
McCall, T.1
-
24
-
-
70349325097
-
Microsoft. Anti-phishing white paper
-
Microsoft. Anti-phishing white paper. Technical report, Microsoft, 2005.
-
(2005)
Technical report, Microsoft
-
-
-
26
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
New York, NY, USA, ACM
-
T. Moore and R. Clayton. Examining the impact of website take-down on phishing. In eCrime '07: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, pages 1-13, New York, NY, USA, 2007. ACM.
-
(2007)
ECrime '07: Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
27
-
-
70349318954
-
-
Mozilla. Phishing protection, 2007. http://www.mozilla.com/en-US/firefox/ phishing-protection/.
-
(2007)
Mozilla. Phishing Protection
-
-
-
28
-
-
70349302772
-
-
Netcraft, 2007. *http://toolbar.netcraft.com/.
-
(2007)
Netcraft
-
-
-
31
-
-
39049164431
-
Anomaly based web phishing page detection
-
Y. Pan and X. Ding. Anomaly based web phishing page detection. acsac, 0:381-392, 2006.
-
(2006)
Acsac
, pp. 381-392
-
-
Pan, Y.1
Ding, X.2
-
32
-
-
77957951644
-
-
Phishtank, 2007. http://www.phishtank.com/.
-
(2007)
Phishtank
-
-
-
33
-
-
34548786769
-
The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
S. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In 2007 IEEE Symposium on Security and Privacy, 2007.
-
(2007)
2007 IEEE Symposium on Security and Privacy
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
34
-
-
70349325095
-
Enhancing one-time passwords for protection against real-time phishing attacks
-
R. Security. Enhancing one-time passwords for protection against real-time phishing attacks. Technical report, RSA, 2007.
-
(2007)
Technical Report RSA
-
-
Security, R.1
-
39
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA, ACM Press
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 601-610, New York, NY, USA, 2006. ACM Press.
-
(2006)
CHI '06: Proceedings of the SIGCHI conference on Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
41
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
New York, NY, USA, ACM Press
-
Y. Zhang, J. I. Hong, and L. F. Cranor. Cantina: A content-based approach to detecting phishing web sites. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 639-648, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th international conference on World Wide Web
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
|