-
1
-
-
72449203008
-
-
Aaron, G., & Rasmussen, R. (2008). Global Phishing Survey: Trends and Domain Name Use 2H2008. Lexington, MA: APWG.
-
Aaron, G., & Rasmussen, R. (2008). Global Phishing Survey: Trends and Domain Name Use 2H2008. Lexington, MA: APWG.
-
-
-
-
2
-
-
72449167296
-
A Comparison of Machine Learning Techniques for Phishing Detection
-
Pittsburgh, PA
-
Abu-Nimeh, S., Nappa, D., Wang, X., & Nair, S. (2007). A Comparison of Machine Learning Techniques for Phishing Detection. APWG eCrimes Researchers Summit, (pp. 60-69). Pittsburgh, PA.
-
(2007)
APWG eCrimes Researchers Summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
4
-
-
67249090254
-
Phishing E-mail Detection Based on Structural properties
-
Albany, NY
-
Chandrasekaran, M., Karayanan, K., & Upadhyaya, S. (2006). Phishing E-mail Detection Based on Structural properties. In New York State Cyber Security Conference, (pp. 2-8). Albany, NY.
-
(2006)
New York State Cyber Security Conference
, pp. 2-8
-
-
Chandrasekaran, M.1
Karayanan, K.2
Upadhyaya, S.3
-
5
-
-
72449155427
-
-
Commission, F. T. (2008). Deter. Detect. Defend. Avoid ID Theft. Retrieved from Fighting Back Against Identity Theft: http://www.ftc.gov/bcp/edu/ microsites/idtheft/index.html
-
Commission, F. T. (2008). Deter. Detect. Defend. Avoid ID Theft. Retrieved from Fighting Back Against Identity Theft: http://www.ftc.gov/bcp/edu/ microsites/idtheft/index.html
-
-
-
-
6
-
-
72449125013
-
-
Commission, F. T. (2008). Phishing - OnGuard Online. Retrieved from OnGuard Online: www.onguardonline.gov/topics/phishing.aspx
-
Commission, F. T. (2008). Phishing - OnGuard Online. Retrieved from OnGuard Online: www.onguardonline.gov/topics/phishing.aspx
-
-
-
-
7
-
-
72449206466
-
-
2.2 Arbitrary File Upload Exploit. Retrieved from
-
Concha, A. (2007). WordPress 2.2 Arbitrary File Upload Exploit. Retrieved from http://www.milw0rm.org/exploits/4113
-
(2007)
WordPress
-
-
Concha, A.1
-
8
-
-
72449208378
-
-
Corporation, I. T. Regions Identity Theft Kit. Retrieved 2009, from Regions: www.regions.com/virtualDocuments/Identity-Theft-Kit.pdf
-
Corporation, I. T. Regions Identity Theft Kit. Retrieved 2009, from Regions: www.regions.com/virtualDocuments/Identity-Theft-Kit.pdf
-
-
-
-
10
-
-
72449180715
-
-
eBay. Spoof Email Tutorial. Retrieved 2009, from eBay: pages.ebay.com/education/spooftutorial/
-
eBay. Spoof Email Tutorial. Retrieved 2009, from eBay: pages.ebay.com/education/spooftutorial/
-
-
-
-
11
-
-
35348913799
-
Learning to Detect Phishing Emails
-
New York, NY: ACM Press
-
Fette, I., Sadeh, N., & Tomasic, A. (2007). Learning to Detect Phishing Emails. WWW '07: Proceedings of the 16th international conference on World Wide Web (pp. 649-656). New York, NY: ACM Press.
-
(2007)
WWW '07: Proceedings of the 16th international conference on World Wide Web
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
12
-
-
77952338717
-
A Framework for Detection and Measurement of Phishing Attacks
-
Alexandria, Vinginia: ACM Press
-
Garera, S., Provos, N., Chew, M., & Rubin, A. (2007). A Framework for Detection and Measurement of Phishing Attacks. In WORM '07: 07: Proceedings of the 2007 ACM Workshop on Recurring Malcode (pp. 1-8). Alexandria, Vinginia: ACM Press.
-
(2007)
WORM '07: 07: Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.4
-
13
-
-
72449168267
-
-
Retrieved 2009, from
-
Google. Google Safe Browsing for Firefox. Retrieved 2009, from http://www.google.com/tools/firefox/safebrowsing/
-
Google Safe Browsing for Firefox
-
-
-
16
-
-
72449212095
-
-
Retrieved 2009, from
-
He, Y. LCS - yiminghe - JavaEye. Retrieved 2009, from http://yiminghe.javaeye.com/blog/257678
-
LCS - yiminghe - JavaEye
-
-
He, Y.1
-
17
-
-
34848911641
-
Social Phishing
-
Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social Phishing. Communications of the ACM, 50(10) 94-100.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
19
-
-
72449131745
-
-
Retrieved 2009, from
-
Microsoft. Anti-Phishing Home. Retrieved 2009, from http://www.microsoft. com/mscorp/safety/technologies/antiphishing/default.mspx
-
Microsoft. Anti-Phishing Home
-
-
-
21
-
-
0009304541
-
A Bayesian Approach to Filtering Junk E-Mail
-
Madison, Wisconsin
-
Sahami, M., Dumais, S., Heckerman, D., & Horvitz, E. (1998). A Bayesian Approach to Filtering Junk E-Mail. In Proceedings of the AAAI'98 Workshop on Learning for Text Categorization, (pp. 52-55). Madison, Wisconsin.
-
(1998)
Proceedings of the AAAI'98 Workshop on Learning for Text Categorization
, pp. 52-55
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
23
-
-
72449196087
-
-
Retrieved 2009, from
-
Symantec. Antiphishing Protection. Retrieved 2009, from http://www.symantec.com/norton/security-response/phishing.jsp
-
Antiphishing Protection
-
-
-
24
-
-
72449129844
-
-
Vind, J. [waraxe-2009-SA#071] - Multiple Vulnerabilities in VirtueMart 1.1.2. Retrieved 2009, from http://www.waraxe.us/advisory-71.html
-
Vind, J. [waraxe-2009-SA#071] - Multiple Vulnerabilities in VirtueMart 1.1.2. Retrieved 2009, from http://www.waraxe.us/advisory-71.html
-
-
-
-
25
-
-
72449182529
-
-
Vind, J. VirtueMart <= 1.1.2 Multiple Remote Vulnerabilities. Retrieved 2009, from http://www.milw0rm.com/exploits/8327
-
Vind, J. VirtueMart <= 1.1.2 Multiple Remote Vulnerabilities. Retrieved 2009, from http://www.milw0rm.com/exploits/8327
-
-
-
-
27
-
-
72449212592
-
Phishing Website Detection
-
IEEE
-
Wenyin, L., Huang, G., Xiaoyue, L., Deng, X., & Min, Z. (2005). Phishing Website Detection. In ICDAR '05: Proceedings of the 2005 Eighth International Conference on Document Analysis and Recognition (pp. 560-564). IEEE.
-
(2005)
ICDAR '05: Proceedings of the 2005 Eighth International Conference on Document Analysis and Recognition
, pp. 560-564
-
-
Wenyin, L.1
Huang, G.2
Xiaoyue, L.3
Deng, X.4
Min, Z.5
-
28
-
-
72449177235
-
-
Z3ro, C. (2007). Joomla Component Expose <=RC35 Remote File Upload Vulnerability. Retrieved from http://www.milw0rm.com/exploits/4194
-
Z3ro, C. (2007). Joomla Component Expose <=RC35 Remote File Upload Vulnerability. Retrieved from http://www.milw0rm.com/exploits/4194
-
-
-
-
29
-
-
35348905575
-
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites
-
Banff, Alberta, Canada: ACM Press
-
Zhang, Y., Hong, J., & Cranor, L. (2007). CANTINA: A Content-Based Approach to Detecting Phishing Web Sites. WWW '07: The 16th International Conference on World Wide Web (pp. 639-648). Banff, Alberta, Canada: ACM Press.
-
(2007)
WWW '07: The 16th International Conference on World Wide Web
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
|