-
1
-
-
0010057718
-
Semantic Attacks: The Third Wave of Network Attacks
-
October 15, 2000
-
Schneier, B. 2000. Semantic Attacks: The Third Wave of Network Attacks. Crypto-Gram Newsletter. October 15, 2000, http://www.schneier.com/crypto-gram- 0010.html
-
(2000)
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
2
-
-
74049155648
-
The Emperor's New Security Indicators
-
Schechter, S. E., Dhamija, R., Ozment, A., Fischer, I., 2007 The Emperor's New Security Indicators. IEEE Symposium on Security and Privacy, 20-23 May 2007.
-
(2007)
IEEE Symposium on Security and Privacy, 20-23 May 2007
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
3
-
-
33745816410
-
Why phishing works in
-
R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, DOI=http://doi.acm.org/10.1145/1124772. 1124861
-
Dhamija, R., Tygar, J. D., and Hearst, M. 2006. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 581-590. DOI=http://doi.acm.org/10.1145/1124772.1124861.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006)
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
4
-
-
60649113812
-
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish
-
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L., Hong, J., and Nunge, E. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. In Proceedings of the Third Symposium on Usable Privacy and Security, 2007.
-
Proceedings of the Third Symposium on Usable Privacy and Security, 2007
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.5
Hong, J.6
Nunge, E.7
-
5
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
ACM Press, New York, NY, 905-914. DOI= http://doi.acm.org/10.1145/ 1240624.1240760
-
Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J., and Nunge, E. 2007. Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Jose, California, USA, April 28 - May 03, 2007). CHI '07. ACM Press, New York, NY, 905-914. DOI= http://doi.acm.org/ 10.1145/1240624.1240760
-
(2007)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (San Jose, California, USA, April 28 - May 03, 2007). CHI '07
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nunge, E.6
-
6
-
-
34250737359
-
Decision strategies and susceptibility to phishing
-
ACM Press, New York, NY, DOI= http://doi.acm.org/10.1145/1143120.1143131
-
Downs, J. S., Holbrook, M. B., and Cranor, L. F. 2006. Decision strategies and susceptibility to phishing. In Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06, vol. 149. ACM Press, New York, NY, 79-90. DOI= http://doi.acm.org/10.1145/1143120.1143131.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security (Pittsburgh, Pennsylvania, July 12 - 14, 2006). SOUPS '06
, vol.149
, pp. 79-90
-
-
Downs, J.S.1
Holbrook, M.B.2
Cranor, L.F.3
-
7
-
-
34848911641
-
Social Phishing
-
To appear in October
-
Jagatic, T., Johnson, N., Jakobsson, M., and Menczer. F. Social Phishing. To appear in Communications of the ACM, October, 2007.
-
(2007)
Communications of the ACM
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
8
-
-
35348822468
-
Fostering E-Mail Security Awareness: The West Point Carronade
-
2005 Retrieved March 22, 2006
-
Ferguson, A. J. 2005. Fostering E-Mail Security Awareness: The West Point Carronade. EDUCASE Quarterly. 2005, 1. Retrieved March 22, 2006, http://www.educause.edu/ir/library/pdf/eqm0517.pdf.
-
(2005)
Educase Quarterly
, pp. 1
-
-
Ferguson, A.J.1
-
10
-
-
84898190494
-
Phinding Phish: Evaluating Anti-Phishing Tools
-
Zhang, Y., S. Egelman, L. Cranor, and J. Hong. 2007. Phinding Phish: Evaluating Anti-Phishing Tools. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, 28 February -2 March, 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, 28 February -2 March, 2007
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
11
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, DOI= http://doi.acm.org/10.1145/1124772. 1124863
-
Wu, M., Miller, R. C., and Garfinkel, S. L. 2006. Do security toolbars actually prevent phishing attacks?. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM Press, New York, NY, 601-610. DOI= http://doi.acm.org/10.1145/1124772.1124863
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada, April 22 - 27, 2006)
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
12
-
-
35348818521
-
Learning to Detect Phishing Emails
-
June CMUISRI-06-112 (To be presented at WWW 2007)
-
Fette, I., N. Sadeh and A. Tomasic. Learning to Detect Phishing Emails. June 2006. ISRI Technical report, CMUISRI-06-112 (To be presented at WWW 2007). http://reportsarchive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-112.pdf
-
(2006)
ISRI Technical Report
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
|