-
1
-
-
77954466474
-
-
Available at: accessed on 4 Nov 2009.
-
BitDefender Anti-Phishing. Available at: http://content-down. bitdefender.eom/wi.ndows/desktop/antiphishing/final./en/Bit.Defender- APFE-2009-Userguide-en.pdf accessed on 4 Nov 2009.
-
BitDefender Anti-Phishing.
-
-
-
2
-
-
70349255573
-
Anti-phishing based on automated individual white-list
-
New York, NY, USA, ACM.
-
Y. Cao, W. Han, and Y. Le. Anti-phishing based on automated individual white-list. In DIM '08: Proceedings of the 4th ACM workshop on Digital identity management, pages 51-60, New York, NY, USA, 2008. ACM.
-
(2008)
DIM '08: Proceedings of the 4th ACM Workshop on Digital Identity Management
, pp. 51-60
-
-
Cao, Y.1
Han, W.2
Le, Y.3
-
3
-
-
33745816410
-
Why phishing works
-
New York, NY, USA, ACM.
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 581-590, New York, NY, USA, 2006. ACM.
-
(2006)
CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
4
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
New York, NY, USA, ACM.
-
S. Garera, N. Pravos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In WORM '07: Proceedings of the 2007 ACM workshop on Recurring malcode, pages 1-8, New York, NY, USA, 2007. ACM.
-
(2007)
WORM '07: Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 1-8
-
-
Garera, S.1
Pravos, N.2
Chew, M.3
Rubin, A.D.4
-
5
-
-
77954507063
-
-
Available at: accessed on 26 Oct 2009
-
Google safe browsing v2.2 protocol. Available at: http://www. antiphishing.org/reports/APWG-GlobalPhishingSurvey-1H2009.pdf accessed on 26 Oct 2009, 2009.
-
(2009)
Google Safe Browsing V2.2 Protocol
-
-
-
6
-
-
34250765199
-
Security and identification indicators for browsers against spoofing and phishing attacks
-
A. Herzberg and A. Gbara. Security and identification indicators for browsers against spoofing and phishing attacks. Cryptology ePrint Archive, Report. 2004/155, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report. 2004155
-
-
Herzberg, A.1
Gbara, A.2
-
8
-
-
37849049401
-
On the effectiveness of techniques to detect phishing sites
-
Berlin, Heidelberg, Springer-Verlag
-
C. Ludl, S. Mcallister, E. Kirda, and C. Kruegel. On the effectiveness of techniques to detect phishing sites. In DIMVA '07: Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 20-39, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
DIMVA '07: Proceedings of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 20-39
-
-
Ludl, C.1
Mcallister, S.2
Kirda, E.3
Kruegel, C.4
-
10
-
-
77954525808
-
-
Available at: accessed on 26 Oct 2009
-
Microsoft's approach to anti-phishing. Available at: http://www. microsoft.com/mscorp/safety/technologies/antiphishing/vision.Inspx accessed on 26 Oct 2009, 2007.
-
(2007)
Microsoft's Approach to Anti-phishing
-
-
-
12
-
-
0003780986
-
The PageRank citation ranking: Bringing order to the web
-
L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project, 1998.
-
(1998)
Technical Report, Stanford Digital Library Technologies Project
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
13
-
-
39049164431
-
Anomaly based web phishing page detection
-
Washington, DC, USA, IEEE Computer Society
-
Y. Pan and X. Ding. Anomaly based web phishing page detection. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference, pages 381-392, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference
, pp. 381-392
-
-
Pan, Y.1
Ding, X.2
-
14
-
-
70449521771
-
-
Available at: accessed on 26 Oct 2009
-
Phishtank. Available at: http://www.phishtank.com/ accessed on 26 Oct 2009.
-
Phishtank
-
-
-
15
-
-
77954508350
-
-
Available at: accessed from 10-28 Oct 2009
-
randomwebsite.com. Available at: http://www.randomwebsite.com/ accessed from 10-28 Oct 2009.
-
Randomwebsite.com
-
-
-
18
-
-
0003653039
-
-
McGraw-Hill, Inc., New York, NY, USA
-
G. Salton and M. J. McGiIl. Introduction to Modern Information Retrieval. McGraw-Hill, Inc., New York, NY, USA, 1986.
-
(1986)
Introduction to Modern Information Retrieval
-
-
Salton, G.1
McGiil, M.J.2
-
19
-
-
77954488710
-
-
Available at: accessed on 5 Nov 2009
-
Web100.com. Available at: http://www.web100.com/web-100 accessed on 5 Nov 2009.
-
Web100.com
-
-
-
20
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA, ACM.
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 601-610, New York, NY, USA, 2006. ACM.
-
(2006)
CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
21
-
-
84865616735
-
A. hybrid phish detection approach by identity discovery and keywords retrieval
-
New York, NY, USA, ACM.
-
G. Xiang and J. I. Hong. A. hybrid phish detection approach by identity discovery and keywords retrieval. In WWW '09: Proceedings of the 18th international conference on World wide web, pages 571-580, New York, NY, USA, 2009. ACM.
-
(2009)
WWW '09: Proceedings of the 18th International Conference on World Wide Web
, pp. 571-580
-
-
Xiang, G.1
Hong, J.I.2
-
23
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
New York, NY, USA, ACM
-
Y. Zhang, J. I. Hong, and L. F. Cranor. Cantina: a content-based approach to detecting phishing web sites. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 639-648, New York, NY, USA, 2007. ACM.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
|