-
1
-
-
7244245467
-
Fighting Internet Auction Fraud: An Assessment and Proposal
-
Oct
-
C.E.H. Chua and J. Wareham, "Fighting Internet Auction Fraud: An Assessment and Proposal," Computer, Oct. 2004, pp. 31-37.
-
(2004)
Computer
, pp. 31-37
-
-
Chua, C.E.H.1
Wareham, J.2
-
2
-
-
27344439205
-
Spam: It's Not Just for Inboxes Anymore
-
Oct
-
Z. Gyongyi and H. Garcia-Molina, "Spam: It's Not Just for Inboxes Anymore," Computer, Oct. 2005, pp. 28-34.
-
(2005)
Computer
, pp. 28-34
-
-
Gyongyi, Z.1
Garcia-Molina, H.2
-
4
-
-
34250653315
-
Detecting Spam Web Pages through Content Analysis
-
ACM Press
-
A. Ntoulas et al., "Detecting Spam Web Pages through Content Analysis," Proc. 15th Int'l Conf. World Wide Web (WWW 06), ACM Press, 2006, pp. 83-92.
-
(2006)
Proc. 15th Int'l Conf. World Wide Web (WWW 06)
, pp. 83-92
-
-
Ntoulas, A.1
-
5
-
-
70350302573
-
Detecting Fake Escrow Websites Using Rich Fraud Cues and Kernel-Based Methods
-
WITS 07, WITS
-
A. Abbasi and H. Chen, "Detecting Fake Escrow Websites Using Rich Fraud Cues and Kernel-Based Methods," Proc. Workshop on Information Technologies and Systems (WITS 07), WITS, 2007, pp. 55-60.
-
(2007)
Proc. Workshop on Information Technologies and Systems
, pp. 55-60
-
-
Abbasi, A.1
Chen, H.2
-
7
-
-
33645131523
-
An Antiphishing Strategy Based on Visual Similarity Assessment
-
Mar./Apr
-
W. Liu et al., "An Antiphishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing, Mar./Apr. 2006, pp. 58-65.
-
(2006)
IEEE Internet Computing
, pp. 58-65
-
-
Liu, W.1
-
8
-
-
27544477921
-
Electronic Commerce Fraud: Towards an Understanding of the Phenomenon
-
IEEE CS Press
-
I. MacInnes, D. Musgrave, and J. Laska, "Electronic Commerce Fraud: Towards an Understanding of the Phenomenon," Proc. Hawaii Int'l Conf. Systems Sciences (HICSS 05), IEEE CS Press, 2005, pp. 181.1-181.11.
-
(2005)
Proc. Hawaii Int'l Conf. Systems Sciences (HICSS 05)
-
-
MacInnes, I.1
Musgrave, D.2
Laska, J.3
-
9
-
-
2342532313
-
Criminals Become Tech Savvy
-
Mar./Apr
-
E. Levy, "Criminals Become Tech Savvy," IEEE Security and Privacy Mar./Apr. 2004, pp. 65-68.
-
(2004)
IEEE Security and Privacy
, pp. 65-68
-
-
Levy, E.1
-
11
-
-
34249853668
-
Usability Evaluation of Anti-Phishing Toolbars
-
L. Li and M. Helenius, "Usability Evaluation of Anti-Phishing Toolbars," J. Computer Virology, vol. 3, no. 2, 2007, pp. 163-184.
-
(2007)
J. Computer Virology
, vol.3
, Issue.2
, pp. 163-184
-
-
Li, L.1
Helenius, M.2
-
13
-
-
33745867321
-
Do Security Toolbars Actually Prevent Phishing Attacks?
-
ACM Press
-
M. Wu, R.C. Miller, and S.L. Garfinkel, "Do Security Toolbars Actually Prevent Phishing Attacks?," Proc. Conf. Human Factors in Computing Systems (CHI 06), ACM Press, 2006, pp. 601-610.
-
(2006)
Proc. Conf. Human Factors in Computing Systems (CHI 06)
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
|