메뉴 건너뛰기




Volumn , Issue , 2009, Pages 636-641

Countermeasure techniques for deceptive phishing attack

Author keywords

Anti phishing; Deceptive; Identity theft; Phishing

Indexed keywords

ANTI-PHISHING; CREDIT CARDS; DECEPTIVE; FINANCIAL ACCOUNTS; FINANCIAL DATA; IDENTITY THEFT; ONLINE IDENTITY; PERSONAL IDENTITY; PHISHERS; PHISHING; PHISHING ATTACKS; SOCIAL ENGINEERING; SOCIAL SECURITY NUMBERS;

EID: 70449573111     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NISS.2009.80     Document Type: Conference Paper
Times cited : (37)

References (36)
  • 8
    • 70449584846 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft, "Sender ID Home Page", http://www.microsoft.com/ mscorp/safety/tehnologies/senderid/default.aspx, 2009.
    • (2009) Sender ID Home Page
  • 12
    • 70449572226 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft, "Internet Explore 7", http://www.microsoft.com/ china/windows/products/winfamily/ie/default.mspx, 2008.
    • (2008) Internet Explore 7
  • 14
    • 70449560710 scopus 로고    scopus 로고
    • Bay
    • Bay, "EBay tool bar", http://pages.ebay.com/ebaytoolbar/, 2008.
    • (2008) EBay Tool Bar
  • 19
    • 33646195873 scopus 로고    scopus 로고
    • ViWiD: Visible watermarking based defense against phishing
    • M. Topkara, A. Kamra, and M. J. Atallah, et al, "ViWiD: Visible Watermarking Based Defense against Phishing", Lecture Notes in Computer Science, Vol.3710, 2005, pp.470-483.
    • (2005) Lecture Notes in Computer Science , vol.3710 , pp. 470-483
    • Topkara, M.1    Kamra, A.2    Atallah, M.J.3
  • 20
    • 33751538239 scopus 로고    scopus 로고
    • Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD)
    • A. Y. Fu, W. Y. Liu, and X. T. Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)". IEEE Transactions on Dependable and Secure Computing, Vol.3, No.4,2006, pp.301-311.
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 301-311
    • Fu, A.Y.1    Liu, W.Y.2    Deng, X.T.3
  • 22
    • 33645131523 scopus 로고    scopus 로고
    • An antiphishing strategy based on visual similarity assessment
    • W Y. Liu, X. T. Deng, and G. L. Huang, et al, "An Antiphishing Strategy Based on Visual Similarity Assessment", IEEE Internet Computing, 2006, Vol.10, pp.58-65.
    • (2006) IEEE Internet Computing , vol.10 , pp. 58-65
    • Liu, W.Y.1    Deng, X.T.2    Huang, G.L.3
  • 30
    • 67249151917 scopus 로고    scopus 로고
    • Acquisti, et al. lessons from a real world evaluation of anti-phishing training
    • P. Kumaraguru, and S. Sheng, "Acquisti, et al. Lessons from a Real World Evaluation of Anti-phishing Training", eCrime Researchers Summit, 2008, pp. 1-12.
    • (2008) ECrime Researchers Summit , pp. 1-12
    • Kumaraguru, P.1    Sheng, S.2
  • 31
    • 41949111662 scopus 로고    scopus 로고
    • Using cartoons to teach internet security
    • S. Srikwan, and M. Jakobsson, "Using Cartoons to Teach Internet Security", Cryptologia, 2008, Vol. 32, No. 2, pp. 137-154.
    • (2008) Cryptologia , vol.32 , Issue.2 , pp. 137-154
    • Srikwan, S.1    Jakobsson, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.