-
1
-
-
77954416223
-
-
Anti-Phishing Working Group (APWG). http://www.apwg.org
-
-
-
-
3
-
-
77954391792
-
After Phishing? Pharming!
-
October
-
Bob Violino, "After Phishing? Pharming!", CSO Magazine, October 2005. http://www.csoonline.com/read/100105/pharm.html
-
(2005)
CSO Magazine
-
-
Violino, B.1
-
4
-
-
38149086751
-
Drive-By Pharming
-
Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings
-
Sid Stamm, Zulfikar Ramzan, "Drive-By Pharming", v4861 LNCS, p495-506, 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings.
-
(2007)
V4861 LNCS
, pp. 495-506
-
-
Stamm, S.1
Ramzan, Z.2
-
5
-
-
33846469356
-
Client-Side Defense against Web-Based Identity Theft
-
Chou, N., R. Ledesma, Y. Teraguchi, D. Boneh, and J.C.Mitchell, "Client-Side Defense against Web-Based Identity Theft". In Proceedings of The 11th Annual Network and Distributed System Security Symposium (NDSS '04).
-
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
7
-
-
35348905575
-
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites
-
16th International World Wide Web Conference, WWW2007
-
Yue Zhang, Jason Hong, Lorrie Cranor, "CANTINA: A Content-Based Approach to Detecting Phishing Web Sites", 16th International World Wide Web Conference, WWW2007, p 639-648, 2007, 16th International World Wide Web Conference, WWW2007.
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
-
8
-
-
33751538239
-
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
-
October/December
-
Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)", IEEE Transactions on Dependable and Secure Computing, v 3, n 4, p 301-311, October/December 2006
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Wenyin, L.2
-
9
-
-
33645131523
-
An Antiphishing Strategy Based on Visual Similarity Assessment
-
March/April
-
Wenyin Liu, Xiaotie Deng, Guanglin Huang, and Anthony Y. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment", IEEE Internet Computing, v 10, n 2, p 58-65, March/April 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Deng, X.2
Huang, G.3
Fu, A.Y.4
-
10
-
-
49049108873
-
Advanced White List Approach for Preventing Access to Phishing Sites
-
JungMin Kang, DoHoon Lee, "Advanced White List Approach for Preventing Access to Phishing Sites", 2007 International Conference on Convergence Information Technology, ICCIT 2007, p 491-496, 2007
-
(2007)
2007 International Conference on Convergence Information Technology, ICCIT 2007
, pp. 491-496
-
-
Kang, J.1
Lee, D.2
-
12
-
-
0012585984
-
-
Microsoft Press, February 13
-
Anthony Jones, Jim Ohlund, "Network Programming for Microsoft Windows, Second Edition", Microsoft Press, February 13, 2002.
-
(2002)
Network Programming for Microsoft Windows, Second Edition
-
-
Jones, A.1
Ohlund, J.2
|