-
1
-
-
49049098349
-
A comparison of machine learning techniques for phishing detection
-
ABU-NIMEH, S., NAPPA, D., WANG, X., AND NAIR, S. 2007. A comparison of machine learning techniques for phishing detection. e-Crime Researchers Summit, Anti-Phishing Working Group.
-
(2007)
E-Crime Researchers Summit, Anti-Phishing Working Group
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
2
-
-
77953574852
-
-
ACCOUNT GUARD
-
ACCOUNT GUARD. 2006. Account Guard. http://pages.ebay.com/ebay-toolbar/.
-
(2006)
-
-
-
3
-
-
0043232732
-
Users are not the enemy
-
DOI=http://doi.acm.org/10.1145/322796.322806
-
ADAMS, A. AND SASSE, M. A. 1999. Users are not the enemy. Comm. ACM 42, 12, 40-46. DOI=http://doi.acm.org/10.1145/322796.322806.
-
(1999)
Comm. ACM 42
, vol.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
4
-
-
0036210232
-
An effective metacognitive strategy: Learning by doing and explaining with a computer-based cognitive tutor
-
ALEVEN, V. AND KOEDINGER, K. R. 2002. An effective metacognitive strategy: learning by doing and explaining with a computer-based cognitive tutor. Cogn. Sci. 26, 2, 147-179.
-
(2002)
Cogn. Sci. 26
, vol.2
, pp. 147-179
-
-
Aleven, V.1
Koedinger, K.R.2
-
5
-
-
67249100997
-
Phishing IQ tests measure fear, not ability
-
ANANDPARA, V., DINGMAN, A., JAKOBSSON, M., LIU, D., AND ROINESTAD, H. 2007. Phishing IQ tests measure fear, not ability. Usable Security Workshop (USEC'07). http://usablesecurity.org/papers/anandpara.pdf.
-
(2007)
Usable Security Workshop (USEC'07)
-
-
Anandpara, V.1
Dingman, A.2
Jakobsson, M.3
Liu, D.4
Roinestad, H.5
-
6
-
-
0004102787
-
-
Lawrence Erlbaum Associates, Inc.
-
ANDERSON, J. R. 1993. Rules of the Mind. Lawrence Erlbaum Associates, Inc.
-
(1993)
Rules of the Mind
-
-
Anderson, J.R.1
-
7
-
-
0000796225
-
Cognitive tutors: Lessons learned
-
ANDERSON, J. R., CORBETT, A. T., KOEDINGER, K. R., AND PELLETIER, R. 1995. Cognitive tutors: Lessons learned. J. Learn. Sci. 4, 2, 167-207.
-
(1995)
J. Learn. Sci. 4
, vol.2
, pp. 167-207
-
-
Anderson, J.R.1
Corbett, A.T.2
Koedinger, K.R.3
Pelletier, R.4
-
9
-
-
77953592060
-
-
ANTI-PHISHING WORKING GROUP
-
ANTI-PHISHING WORKING GROUP. 2007. Anti-Phishing Working Group. http://www.antiphishing.org/.
-
(2007)
-
-
-
10
-
-
0001119971
-
Maintenance of knowledge: Questions about memory we forgot to ask
-
BAHRICK, H. P. 1979. Maintenance of knowledge: Questions about memory we forgot to ask. J. Exper. Psych. 108, 3, 296-308.
-
(1979)
J. Exper. Psych. 108
, vol.3
, pp. 296-308
-
-
Bahrick, H.P.1
-
11
-
-
37249051803
-
Modeling the acquistion of fluent skill in educational action games
-
BAKER, R., HABGOOD, J., AND AINSWORTH, S. E. 2007. Modeling the acquistion of fluent skill in educational action games. Proceedings of the Conference on User Modeling, 17-26.
-
(2007)
Proceedings of the Conference on User Modeling
, pp. 17-26
-
-
Baker, R.1
Habgood, J.2
Ainsworth, S.E.3
-
12
-
-
85047672328
-
When and where do we apply what we learn? A taxonomy for far transfer
-
BARNETT, S. M. AND CECI, S. J. 2002. When and where do we apply what we learn? a taxonomy for far transfer. Psych. Bull. 128, 612-637.
-
(2002)
Psych. Bull. 128
, pp. 612-637
-
-
Barnett, S.M.1
Ceci, S.J.2
-
13
-
-
0002213688
-
Rethinking transfer: A simple proposal with multiple implications
-
A. Iran-Nejad and P. D. Pearson., Eds. American Educational Research Association (AERA), Washington, DC
-
BRANSFORD, J. D. AND SCHWARTZ, D. L. 2001. Rethinking transfer: A simple proposal with multiple implications. In Review of Research in Education, A. Iran-Nejad and P. D. Pearson., Eds. Vol. 24, American Educational Research Association (AERA), Washington, DC, 61-100.
-
(2001)
Review of Research in Education
, vol.24
, pp. 61-100
-
-
Bransford, J.D.1
Schwartz, D.L.2
-
14
-
-
77953560298
-
Embedded training intelligent tutoring systems (ITS) for the future combat systems (FCS) command and control (C2) vehicle
-
BURMESTER, G. M., STOTTLER, D., AND HART, J. L. 2005. Embedded training intelligent tutoring systems (ITS) for the future combat systems (FCS) command and control (C2) vehicle. Tech. rep., Defense Technical Information Center. http://www.stottlerhenke.com/papers/IITSEC-02-ITSFCS.pdf.
-
(2005)
Tech. Rep., Defense Technical Information Center
-
-
Burmester, G.M.1
Stottler, D.2
Hart, J.L.3
-
18
-
-
0004134359
-
-
COMMITTEE ON DEVELOPMENTS IN THE SCIENCE OF LEARNING AND NATIONAL RESEARCH COUNCIL National Academies Press
-
COMMITTEE ON DEVELOPMENTS IN THE SCIENCE OF LEARNING AND NATIONAL RESEARCH COUNCIL. 2000. How People Learn: Bridging Research and Practice. National Academies Press.
-
(2000)
How People Learn: Bridging Research and Practice
-
-
-
19
-
-
0035030527
-
Locus of feedback control in computer-based tutoring: Impact on learning rate, achievement and attitudes
-
ACM Press, New York, NY
-
CORBETT, A. T. AND ANDERSON, J. R. 2001. Locus of feedback control in computer-based tutoring: impact on learning rate, achievement and attitudes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'01). ACM Press, New York, NY, 245-252.
-
(2001)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'01)
, pp. 245-252
-
-
Corbett, A.T.1
Anderson, J.R.2
-
20
-
-
0030362821
-
Intrinsic motivation and the process of learning: Beneficial effects of contextualization, personalization, and choice
-
CORDOVA, D. I. AND LEPPER, M. R. 1996. Intrinsic motivation and the process of learning: Beneficial effects of contextualization, personalization, and choice. J. Educ. Psych. 88, 4, 715-730.
-
(1996)
J. Educ. Psych. 88
, vol.4
, pp. 715-730
-
-
Cordova, D.I.1
Lepper, M.R.2
-
23
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
ACM Press, New York, NY
-
DHAMIJA, R. AND TYGAR, J. 2005. The battle against phishing: Dynamic security skins. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS'05). ACM Press, New York, NY, 77-88.
-
(2005)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS'05)
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.2
-
24
-
-
77953577889
-
-
EBAY. 2006. Spoof email tutorial. http://pages.ebay.com/education/ spooftutorial.
-
(2006)
Spoof Email Tutorial
-
-
-
27
-
-
33748985945
-
Online identity theft: Phishing technology, chokepoints and countermeasures
-
October
-
EMIGH, A. 2005. Online identity theft: Phishing technology, chokepoints and countermeasures. Tech. rep., Radix Labs. October. http://www.antiphishing. org/Phishing-dhs-report.pdf.
-
(2005)
Tech. Rep., Radix Labs
-
-
Emigh, A.1
-
29
-
-
35348888363
-
-
FEDERAL TRADE COMMISSION. 2006a. An e-card for you game. http://www.ftc.gov/bcp/conline/ecards/phishing/index.html.
-
(2006)
An E-Card for You Game
-
-
-
30
-
-
79952526821
-
How not to get hooked by a phishing scam
-
FEDERAL TRADE COMMISSION. 2006b. How not to get hooked by a phishing scam. Consumer alert news. http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/ alt127.htm.
-
(2006)
Consumer Alert News
-
-
-
31
-
-
35348822468
-
Fostering e-mail security awareness: The west point carronade
-
FERGUSON, A. J. 2005. Fostering e-mail security awareness: The west point carronade. EDUCASE Quart. 1. http://www.educause.edu/ir/library/pdf/eqm0517. pdf.
-
(2005)
EDUCASE Quart. 1
-
-
Ferguson, A.J.1
-
33
-
-
34548172244
-
Stopping a phishing attack, even when the victims ignore warnings
-
FLORENCIO, D. AND HERLEY, C. 2005. Stopping a phishing attack, even when the victims ignore warnings. Tech. rep., Microsoft.
-
(2005)
Tech. Rep., Microsoft
-
-
Florencio, D.1
Herley, C.2
-
34
-
-
0026127152
-
Immediate and delayed transfer of training effects in statistical reasoning
-
FONG, G. T. AND NISBETT, R. E. 1991. Immediate and delayed transfer of training effects in statistical reasoning. J. Exper. Psych. 120, 34-45.
-
(1991)
J. Exper. Psych. 120
, pp. 34-45
-
-
Fong, G.T.1
Nisbett, R.E.2
-
35
-
-
0006791169
-
The measurement of transfer of training
-
GAGNE, R. M., FOSTER, H., AND CROWLEY, M. E. 1948. The measurement of transfer of training. Psych. Bull. 45, 2, 97-130.
-
(1948)
Psych. Bull. 45
, vol.2
, pp. 97-130
-
-
Gagne, R.M.1
Foster, H.2
Crowley, M.E.3
-
36
-
-
33749646491
-
CSI/FBI computer crime and security survey
-
GORDON, L. A., LOEB, M. P., LUCYSHYN, W., AND RICHARDSON, R. 2006. CSI/FBI computer crime and security survey. Report, Computer Security Institute.
-
(2006)
Report, Computer Security Institute
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
39
-
-
77952351130
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
JACKSON, C., SIMON, D., TAN, D., AND BARTH, A. 2007. An evaluation of extended validation and picture-in-picture phishing attacks. In Proceedings of the Usable Security Workshop (USEC'07). http://usablesecurity.org/papers/ jackson.pdf.
-
(2007)
Proceedings of the Usable Security Workshop (USEC'07)
-
-
Jackson, C.1
Simon, D.2
Tan, D.3
Barth, A.4
-
40
-
-
34848911641
-
Social phishing
-
JAGATIC, T., JOHNSON, N., JAKOBSSON, M., AND MENCZER, F. 2007. Social phishing. Comm. ACM 50, 10, 94-100.
-
(2007)
Comm. ACM 50
, vol.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
43
-
-
35348877312
-
-
Syngress Publishing, Canada
-
JAMES, L. 2005. Phishing Exposed. Syngress Publishing, Canada.
-
(2005)
Phishing Exposed
-
-
James, L.1
-
45
-
-
77953572516
-
Problem-based embedded training: An instructional methodology for embedded training using mixed and virtual reality technologies
-
KIRKLEY, J. R. AND ET AL. 2003. Problem-based embedded training: An instructional methodology for embedded training using mixed and virtual reality technologies. In Proceedings of the Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC). http://www.iforces.org/downloads/problem- based.pdf.
-
(2003)
Proceedings of the Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC)
-
-
Kirkley, J.R.1
-
47
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
ACM Press, New York, NY
-
KUMARAGURU, P., RHEE, Y., ACQUISTI, A., CRANOR, L. F., HONG, J., AND NUNGE, E. 2007a. Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'07). ACM Press, New York, NY, 905-914.
-
(2007)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI'07)
, pp. 905-914
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nunge, E.6
-
48
-
-
84983228550
-
Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer
-
KUMARAGURU, P., RHEE, Y., SHENG, S., HASAN, S., ACQUISTI, A., CRANOR, L. F., AND HONG, J. 2007b. Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer. e-Crime Researchers Summit, Anti-Phishing Working Group.
-
(2007)
E-Crime Researchers Summit, Anti-Phishing Working Group
-
-
Kumaraguru, P.1
Rhee, Y.2
Sheng, S.3
Hasan, S.4
Acquisti, A.5
Cranor, L.F.6
Hong, J.7
-
51
-
-
77953583932
-
-
MAIL FRONTIER. 2006. Mailfrontier phishing IQ test. http://survey. mailfrontier.com/survey/quiztest.html.
-
(2006)
Mailfrontier Phishing IQ Test
-
-
-
54
-
-
33144464259
-
Fostering the intelligent novice: Learning from errors with metacognitive tutoring
-
MATHAN, S. A. AND KOEDINGER, K. R. 2005. Fostering the intelligent novice: Learning from errors with metacognitive tutoring. Educ. Psych. 40, 4, 257-265.
-
(2005)
Educ. Psych. 40
, vol.4
, pp. 257-265
-
-
Mathan, S.A.1
Koedinger, K.R.2
-
55
-
-
0003781450
-
-
Cambridge University Press, Cambidge, UK
-
MAYER, R. E. 2001. Multimedia Learning. Cambridge University Press, Cambidge, UK.
-
(2001)
Multimedia Learning
-
-
Mayer, R.E.1
-
56
-
-
58149205843
-
The instructive animation: Helping students build connections between words and pictures in multimedia learning
-
MAYER, R. E. AND ANDERSON, R. B. 1992. The instructive animation: Helping students build connections between words and pictures in multimedia learning. J. Educ. Psych. 84, 4, 444-452.
-
(1992)
J. Educ. Psych. 84
, vol.4
, pp. 444-452
-
-
Mayer, R.E.1
Anderson, R.B.2
-
57
-
-
0344837787
-
Understanding the potential of teachable moments: The case of smoking cessation
-
MCBRIDE, C. M., EMMONS, K. M., AND LIPKUS, I. M. 2003. Understanding the potential of teachable moments: the case of smoking cessation. Health Educ. Resear. 18, 2, 156-170.
-
(2003)
Health Educ. Resear. 18
, vol.2
, pp. 156-170
-
-
Mcbride, C.M.1
Emmons, K.M.2
Lipkus, I.M.3
-
58
-
-
0000442605
-
The transfer paradox: Effects of contextual interference on retention and transfer performance of a complex cognitive skill
-
MERRIENBOER, J. V., DE CROOCK, M., AND JELSMA, O. 1997. The transfer paradox: Effects of contextual interference on retention and transfer performance of a complex cognitive skill. Percept. Motor Skills 84, 784-786.
-
(1997)
Percept. Motor Skills 84
, pp. 784-786
-
-
Merrienboer, J.V.1
De Croock, M.2
Jelsma, O.3
-
59
-
-
77953559000
-
-
MICROSOFT CORPORATION. 2006. Consumer awareness page on phishing. http://www.microsoft.com/athome/security/email/phishing.mspx.
-
(2006)
Consumer Awareness Page on Phishing
-
-
-
61
-
-
0033137475
-
Cognitive principles of multimedia learning: The role of modality and contiguity
-
MORENO, R. AND MAYER, R. E. 1999. Cognitive principles of multimedia learning: The role of modality and contiguity. J. Educ. Psych. 91, 358-368.
-
(1999)
J. Educ. Psych. 91
, pp. 358-368
-
-
Moreno, R.1
Mayer, R.E.2
-
62
-
-
77953560642
-
-
URL
-
MYSECURECYBERSPACE. 2007. Uniform resource locator (URL). http://www.mysecurecyberspace.com/encyclopedia/index/uniform-resource-locator- url-.html.
-
(2007)
Uniform Resource Locator
-
-
-
63
-
-
77953599876
-
-
NETCRAFT. 2006. Netcraf. http://toolbar.netcraft.com/.
-
(2006)
Netcraf
-
-
-
66
-
-
34548331875
-
Don't be a phish: Steps in user education
-
DOI 10.1145/1140124.1140187, Working Group Reports on ITiCSE on Innovation and Technology in Computer Science Education 2006
-
ROBILA, S. A. AND RAGUCCI, J. W. 2006. Don't be a phish: steps in user education. In Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education (ITICSE'06). ACM Press, New York, NY, 237-241. DOI=http://doi.acm.org/10.1145/1140124.1140187. (Pubitemid 47344419)
-
(2006)
Working Group Reports on ITiCSE on Innovation and Technology in Computer Science Education 2006
, pp. 237-241
-
-
Robila, S.A.1
Ragucci, J.W.2
-
67
-
-
0346706306
-
One hundred years of forgetting: A quantitative description of retention
-
RUBIN, D. C. AND WENZEL, A. E. 1996. One hundred years of forgetting: A quantitative description of retention. Psych. Rev. 103, 4, 734-760.
-
(1996)
Psych. Rev. 103
, vol.4
, pp. 734-760
-
-
Rubin, D.C.1
Wenzel, A.E.2
-
69
-
-
84965393809
-
New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training
-
SCHMIDT, R. A. AND BJORK, R. A. 1992. New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training. Psych. Sci. 3, 4, 207-217.
-
(1992)
Psych. Sci. 3
, vol.4
, pp. 207-217
-
-
Schmidt, R.A.1
Bjork, R.A.2
-
70
-
-
0010057718
-
Semantic attacks: The third wave of network attacks
-
SCHNEIER, B. 2000. Semantic attacks: The third wave of network attacks. Crypto-Gram Newsletter. http://www.schneier.com/crypto-gram-0010.html#1.
-
(2000)
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
72
-
-
77953604049
-
-
SENDER POLICY FRAMEWORK
-
SENDER POLICY FRAMEWORK. 2006. Sender Policy Framework. http://www.openspf.org/.
-
(2006)
Sender Policy Framework
-
-
-
73
-
-
60649113812
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
-
SHENG, S., MAGNIEN, B., KUMARAGURU, P., ACQUISTI, A., CRANOR, L. F., HONG, J., AND NUNGE, E. 2007. Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. Proceedings of the Symposium on Usable Privacy and Security.
-
(2007)
Proceedings of the Symposium on Usable Privacy and Security
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
74
-
-
84904793179
-
An empirical analysis of phishing blacklists
-
SHENG, S., WARDMAN, B., WARNER, G., CRANOR, L., HONG, J., AND ZHANG, C. 2009. An empirical analysis of phishing blacklists. Proceedings of the 6th Conference on Email and Anti-Spam.
-
(2009)
Proceedings of the 6th Conference on Email and Anti-Spam
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.4
Hong, J.5
Zhang, C.6
-
76
-
-
77953565874
-
-
SPOOFGUARD. 2006. Spoofguard. http://crypto.stanford.edu/SpoofGuard/.
-
(2006)
Spoofguard
-
-
-
77
-
-
77953598259
-
-
SPOOFSTICK. 2006. Spoofstick. http://www.spoofstick.com/.
-
(2006)
Spoofstick
-
-
-
78
-
-
19944372231
-
-
Ph.D. thesis, Carnegie Mellon University
-
WHITTEN, A. 2004. Making security usable. Ph.D. thesis, Carnegie Mellon University.
-
(2004)
Making Security Usable
-
-
Whitten, A.1
-
79
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
WU, M., MILLER, R. C., AND GARFINKEL, S. L. 2006. Do security toolbars actually prevent phishing attacks? In Proceedings of the Conference on Human Factors in Computing Systems (CHI), 601-610.
-
(2006)
Proceedings of the Conference on Human Factors in Computing Systems (CHI)
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
81
-
-
85084161317
-
Trusted paths for browsers
-
USENIX Association, Berkeley, CA
-
YE, Z. E. AND SMITH, S. 2002. Trusted paths for browsers. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA, 263-279.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 263-279
-
-
Ye, Z.E.1
Smith, S.2
-
82
-
-
84898190494
-
Phinding phish: Evaluating anti-phishing tools
-
ZHANG, Y., EGELMAN, S., CRANOR, L., AND HONG, J. 2007. Phinding phish: Evaluating anti-phishing tools. In Proceedings of the 14th Annual Network and Distributed System Security Symposium. http://lorrie.cranor.org/pubs/ndss-phish- tools-final.pdf.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
|