메뉴 건너뛰기




Volumn 10, Issue 2, 2010, Pages

BogusBiter: A transparent protection against phishing attacks

Author keywords

Credential theft; Phishing; Security; Usability; Web spoofing

Indexed keywords

ANTI-PHISHING; DETECTION TECHNIQUE; FIREFOX; HUMAN USERS; INTERNET USERS; NEW APPROACHES; PHISHING; PHISHING ATTACKS; TRANSPARENT PROTECTION; USABILITY STUDIES; WEB SPOOFING;

EID: 77953587426     PISSN: 15335399     EISSN: 15576051     Source Type: Journal    
DOI: 10.1145/1754393.1754395     Document Type: Article
Times cited : (59)

References (66)
  • 3
    • 77953579556 scopus 로고    scopus 로고
    • APWG
    • APWG. 2008. Anti-Phishing Working Group (APWG). http://www.antiphishing. org/.
    • (2008)
  • 5
    • 77953564872 scopus 로고    scopus 로고
    • POETTERING, B. 2008. jssha256. http://point-at-infinity.org/jssha256/.
    • (2008)
    • Poettering, B.1
  • 13
    • 77953547563 scopus 로고    scopus 로고
    • EBANKINGSECURITY. 2008. eBanking Security. http://www.ebankingsecurity. com/ebanking-bad-for-your-bank-balance.pdf.
    • (2008) EBanking Security
  • 18
    • 77953565876 scopus 로고    scopus 로고
    • FIREFOXPHISHINGPROTECTION. 2008. Firefox Phishing Protection. http://www.mozilla.com/en-US/firefox/phishing-protection/.
    • (2008) Firefox Phishing Protection
  • 25
    • 77953574204 scopus 로고    scopus 로고
    • inc.
    • GARTNERSURVEY. 2006. Gartner, inc., http://www.gartner.com/it/page.jsp? id=498245.
    • (2006) Gartner
  • 27
    • 77953606593 scopus 로고    scopus 로고
    • IBM-FAIRUCE
    • IBM-FAIRUCE. 2005. IBM set to use spam to attack spammer. http://money.cnn.com/2005/03/22/technology/ibm-spam/index.htm.
    • (2005) IBM Set to use Spam to Attack Spammer
  • 28
    • 77953580896 scopus 로고    scopus 로고
    • INACCESSIBILITYCAPTCHA
    • INACCESSIBILITYCAPTCHA. 2008. Inaccessibility of CAPTCHA. http://www.w3.org/TR/turingtest/.
    • (2008) Inaccessibility of CAPTCHA
  • 35
    • 0040231044 scopus 로고
    • Foiling the cracker - A survey of, and improvements to, password security
    • KLEIN, D. V. 1990. Foiling the cracker - A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Workshop on Security. 5-14.
    • (1990) Proceedings of the 2nd USENIX Workshop on Security , pp. 5-14
    • Klein, D.V.1
  • 37
    • 77953557877 scopus 로고    scopus 로고
    • KYE-PHISHING
    • KYE-PHISHING. 2008. Know Your Enemy: Phishing. http://www.honeynet.org/ papers/phishing/.
    • (2008) Know Your Enemy: Phishing
  • 40
    • 77953555077 scopus 로고    scopus 로고
    • MICROSOFTPHISHINGFILTER. 2008. Microsoft Phishing Filter. http://www.microsoft.com/protect/products/yourself/.
    • (2008) Microsoft Phishing Filter
  • 43
    • 0018543411 scopus 로고
    • Password security: A case history
    • MORRIS, R. AND THOMPSON, K. 1979. Password security: A case history. Comm. ACM 22, 11, 594-597.
    • (1979) Comm. ACM 22 , vol.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 46
    • 77953551186 scopus 로고    scopus 로고
    • PHISHTANK
    • PHISHTANK. 2008. PhishTank. http://www.phishtank.com/.
    • (2008)
  • 52
    • 34548786769 scopus 로고    scopus 로고
    • The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • SCHECHTER, S. E., DHAMIJA, R., OZMENT, A., AND FISCHER, I. 2007. The emperor's new security indicators: An evaluation of Website authentication and the effect of role playing on usability studies. In Proceedings of the IEEE Symposium on Security and Privacy. 51-65.
    • (2007) Proceedings of the IEEE Symposium on Security and Privacy , pp. 51-65
    • Schechter, S.E.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 61
    • 77953606247 scopus 로고    scopus 로고
    • XMLHTTPREQUEST. 2008. http://www.w3.org/TR/XMLHttpRequest/.
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.