-
4
-
-
34848911641
-
Social phishing
-
T. Jagatic, N. Johnson, and M. Jakobsson, et al, "Social Phishing", Communication of the ACM, 2007, Vol.50, No. 10, pp.94-100.
-
(2007)
Communication of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
-
8
-
-
70449584846
-
-
Microsoft
-
Microsoft, "Sender ID Home Page", http://www.microsoft.com/ mscorp/safety/tehnologies/senderid/default.aspx, 2009.
-
(2009)
Sender ID Home Page
-
-
-
12
-
-
70449572226
-
-
Microsoft
-
Microsoft, "Internet Explore 7", http://www.microsoft.com/ china/windows/products/winfamily/ie/default.mspx, 2008.
-
(2008)
Internet Explore 7
-
-
-
14
-
-
70449560710
-
-
Bay
-
Bay, "EBay tool bar", http://pages.ebay.com/ebaytoolbar/, 2008.
-
(2008)
EBay Tool Bar
-
-
-
17
-
-
33745816410
-
Why phishing works?
-
R. Dhamija, J. D. Tygar, and M. Hearst, "Why Phishing Works?", In: Proc. of the SIGCHI conference on Human Factors in computing systems, 2006, pp.581-590.
-
(2006)
Proc. of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
18
-
-
70249114141
-
Visual-similarity-based phishing detection
-
E. Medved, E. Kirda, and C. Kruegel, "Visual-Similarity-Based Phishing Detection", In: Proc. of the 4th International Conference on Security and Privacy in Communication Networks, 2008, pp.234-245.
-
(2008)
Proc. of the 4th International Conference on Security and Privacy in Communication Networks
, pp. 234-245
-
-
Medved, E.1
Kirda, E.2
Kruegel, C.3
-
19
-
-
33646195873
-
ViWiD: Visible watermarking based defense against phishing
-
M. Topkara, A. Kamra, and M. J. Atallah, et al, "ViWiD: Visible Watermarking Based Defense against Phishing", Lecture Notes in Computer Science, Vol.3710, 2005, pp.470-483.
-
(2005)
Lecture Notes in Computer Science
, vol.3710
, pp. 470-483
-
-
Topkara, M.1
Kamra, A.2
Atallah, M.J.3
-
20
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
-
A. Y. Fu, W. Y. Liu, and X. T. Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)". IEEE Transactions on Dependable and Secure Computing, Vol.3, No.4,2006, pp.301-311.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Liu, W.Y.2
Deng, X.T.3
-
21
-
-
85044841595
-
Client-side defense against web-based identify theft
-
N. Chou, R. Ledesma, and Y. Teraguchi, et al, "Client-side Defense against Web-based Identify Theft", In: Proc. of 11th Annual Network and Distributed System Security Symposium, 2004, pp.1-16.
-
(2004)
In: Proc. of 11th Annual Network and Distributed System Security Symposium
, pp. 1-16
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
-
22
-
-
33645131523
-
An antiphishing strategy based on visual similarity assessment
-
W Y. Liu, X. T. Deng, and G. L. Huang, et al, "An Antiphishing Strategy Based on Visual Similarity Assessment", IEEE Internet Computing, 2006, Vol.10, pp.58-65.
-
(2006)
IEEE Internet Computing
, vol.10
, pp. 58-65
-
-
Liu, W.Y.1
Deng, X.T.2
Huang, G.L.3
-
23
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
S. Garera, N. Provos, and M. Chew, et al, "A Framework for Detection and Measurement of Phishing Attacks", In: Proc. of the 5th ACM Workshop on Recurring Malcode, 2007, pp. 1-8.
-
(2007)
Proc. of the 5th ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
-
25
-
-
33244477163
-
Stronger password authentication using browser extensions
-
B. Ross, C. Jackson, and N. Miyake, "Stronger Password Authentication Using Browser Extensions", In: Proc. of the 14th Usenix Security Symposium, 2005, pp.2-16.
-
(2005)
Proc. of the 14th Usenix Security Symposium
, pp. 2-16
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
-
28
-
-
35348905575
-
CANTINA: A content-based approach to detecting phishing web sites
-
Y. Zhang, J. Hong, and L. F. Cranor, "CANTINA: A Content-Based Approach to Detecting Phishing Web Sites", In: Proc. of the 16th International World Wide Web Conference, 2007, pp.639-648.
-
(2007)
Proc. of the 16th International World Wide Web Conference
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.F.3
-
29
-
-
36849073159
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
-
S. Sheng, B. Magnien, and P. Kumaraguru, et al, "Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish". In: Proc. of the 2007 Symposium on Usable Privacy and Security, 2007, pp.88-99.
-
(2007)
Proc. of the 2007 Symposium on Usable Privacy and Security
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
-
30
-
-
67249151917
-
Acquisti, et al. lessons from a real world evaluation of anti-phishing training
-
P. Kumaraguru, and S. Sheng, "Acquisti, et al. Lessons from a Real World Evaluation of Anti-phishing Training", eCrime Researchers Summit, 2008, pp. 1-12.
-
(2008)
ECrime Researchers Summit
, pp. 1-12
-
-
Kumaraguru, P.1
Sheng, S.2
-
31
-
-
41949111662
-
Using cartoons to teach internet security
-
S. Srikwan, and M. Jakobsson, "Using Cartoons to Teach Internet Security", Cryptologia, 2008, Vol. 32, No. 2, pp. 137-154.
-
(2008)
Cryptologia
, vol.32
, Issue.2
, pp. 137-154
-
-
Srikwan, S.1
Jakobsson, M.2
-
32
-
-
77953906935
-
Behavioral response to phishing risk
-
J. S. Downs, M. Holbrook, and L. F. Cranor, "Behavioral Response to Phishing Risk", In: Proc. of the 2nd Annual eCrime Researchers, 2007, pp.3 7-44.
-
(2007)
Proc. of the 2nd Annual ECrime Researchers
, pp. 37-44
-
-
Downs, J.S.1
Holbrook, M.2
Cranor, L.F.3
-
33
-
-
37849049401
-
On the effectiveness of techniques to detect phishing sites
-
C. Ludl, S. McAllister, and E. Kirda, et al, "On the Effectiveness of Techniques to Detect Phishing Sites", In: Proc. of Detection of Intrusions and Malware and Vulnerability Assessment, 2007, pp.20-39.
-
(2007)
Proc. of Detection of Intrusions and Malware and Vulnerability Assessment
, pp. 20-39
-
-
Ludl, C.1
McAllister, S.2
Kirda, E.3
-
34
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
M. Wu, R. C. Miller, and S. L. Garfinkel, "Do Security Toolbars Actually Prevent Phishing Attacks?", In: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, 2006, pp.601-610.
-
(2006)
Proc. of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
36
-
-
70449567103
-
Designing and conducting phishing experiments
-
P. Finn, and M. Jakobsson, "Designing and Conducting Phishing Experiments", IEEE Technology and Society Magazine, Special Issue on Usability and Security, 2007, pp.1-21.
-
(2007)
IEEE Technology and Society Magazine, Special Issue on Usability and Security
, pp. 1-21
-
-
Finn, P.1
Jakobsson, M.2
|