-
1
-
-
51349089199
-
A Layout-Similarity-Based Approach for Detecting Phishing Pages
-
rd International Conference on Security and Privacy in Communication Networks, Nice, France, Sept 2007, pp. 454-463.
-
rd International Conference on Security and Privacy in Communication Networks, Nice, France, Sept 2007
, pp. 454-463
-
-
Rosiello, A.1
Krida, E.2
Kruegel, C.3
Ferrandi, F.4
-
2
-
-
39049164431
-
Anomaly-based Web Phishing Page Detection
-
nd Annual Computer Security Applications Conference, Miami, Florida, December 2006, pp. 381-392.
-
nd Annual Computer Security Applications Conference, Miami, Florida, December 2006
, pp. 381-392
-
-
Pan, Y.1
Ding, X.2
-
3
-
-
34248554408
-
Protecting Users Against Phishing Attacks with AntiPhish
-
th Annual International Computer Software and Applications Conference, July 2005, Edinburgh, Scotland, pp. 517-524.
-
th Annual International Computer Software and Applications Conference, July 2005, Edinburgh, Scotland
, pp. 517-524
-
-
Krida, E.1
Kruegel, C.2
-
5
-
-
70349323626
-
User Behavior-based Phishing Websites Detection
-
X. Dong, J. A Clark, and J. Jacob, "User Behavior-based Phishing Websites Detection," Proc. of International Multiconference on Computer Science and Information Technology, Wisla, Poland, October 2008, pp. 783-790.
-
Proc. of International Multiconference on Computer Science and Information Technology, Wisla, Poland, October 2008
, pp. 783-790
-
-
Dong, X.1
Clark, J.A.2
Jacob, J.3
-
7
-
-
35348905575
-
CANTINA: A Content-based Approach Detecting Phishing Websites
-
th Intl. Conf. on World Wide Web, Banff, Alberta, May 2007, pp. 639-648.
-
th Intl. Conf. on World Wide Web, Banff, Alberta, May 2007
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
-
8
-
-
85044841595
-
Client-side Defense Against Web-based Identify Theft
-
th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, CA, February 2004.
-
th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, CA, February 2004
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.5
-
9
-
-
70350630557
-
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs
-
th International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 1245-1254.
-
th International Conference on Knowledge Discovery and Data Mining, Paris, France
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.2
Savag, S.3
Voelker, G.4
-
10
-
-
67249152321
-
Automating Phishing Website Identification through Deep MD5 Matching
-
Atlanta, USA, October
-
B. Wardman and G. Warner, "Automating Phishing Website Identification through Deep MD5 Matching," eCrime Researchers Summit, Atlanta, USA, October 2008, pp. 1-7.
-
(2008)
eCrime Researchers Summit
, pp. 1-7
-
-
Wardman, B.1
Warner, G.2
-
11
-
-
33845926633
-
PHONEY: Mimicking User Response to Detect Phishing Attacks
-
M. Chandrasekaran, R. Chinchani, and S. Upadhyaya, "PHONEY: Mimicking User Response to Detect Phishing Attacks," Proc. of Intl. Symposium on World of Wireless, Mobile and Multimedia Networks, 2006, Niagara-Falls, NY, June 2006, pp. 668-672.
-
Proc. of Intl. Symposium on World of Wireless, Mobile and Multimedia Networks, 2006, Niagara-Falls, NY, June 2006
, pp. 668-672
-
-
Chandrasekaran, M.1
Chinchani, R.2
Upadhyaya, S.3
-
12
-
-
60649094724
-
Anti-Phishing in Offense and Defense
-
C. Yue and H. Wang, "Anti-Phishing in Offense and Defense," Proc. of the Annual Computer Security Applications Conference (ACSAC), Anaheim, California, December 2008, pp. 345-354
-
Proc. of the Annual Computer Security Applications Conference (ACSAC), Anaheim, California, December 2008
, pp. 345-354
-
-
Yue, C.1
Wang, H.2
-
13
-
-
70449526286
-
Discovering Phishing Target based on Semantic Link Network
-
Elsevier, March 2010
-
L. Wenyin, N. Fang, X. Quan, B. Qiu, and G. Liu, "Discovering Phishing Target based on Semantic Link Network," Future Generation Computer Systems, Elsevier, Volume 26, Issue 3, March 2010, pp. 381-388.
-
Future Generation Computer Systems
, vol.26
, Issue.3
, pp. 381-388
-
-
Wenyin, L.1
Fang, N.2
Quan, X.3
Qiu, B.4
Liu, G.5
-
14
-
-
62449094173
-
PhishGuard: A Browser Plug-in for Protection from Phishing
-
nd International Conference on Internet Multimedia Services Architecture and Applications, Bangalore, India, December 2008, pp. 1-6.
-
nd International Conference on Internet Multimedia Services Architecture and Applications, Bangalore, India, December 2008
, pp. 1-6
-
-
Joshi, Y.1
Saklikar, S.2
Das, D.3
Saha, S.4
-
15
-
-
33645131523
-
An Antiphishing Strategy Based on Visual Similarity Assessment
-
March
-
W. Liu, G. Huang, G. Huang, and A. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing, Volume 10, Issue 2, March 2006, pp. 58-65.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Huang, G.2
Huang, G.3
Fu, A.4
-
17
-
-
35348913799
-
Learning to Detect Phishing Emails
-
th Intl. Conf. on World Wide Web, Banff, Alberta, Canada, May 2007, pp. 649-656.
-
th Intl. Conf. on World Wide Web, Banff, Alberta, Canada, May 2007
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
18
-
-
84865616735
-
A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval
-
th International Conference on World Wide Web, Madrid, Spain, April 2009, pp. 571-580.
-
th International Conference on World Wide Web, Madrid, Spain, April 2009
, pp. 571-580
-
-
Xiang, G.1
Hong, J.2
-
19
-
-
22144441364
-
Testing Web Applications by Modeling with FSMs
-
A. Andrews, J. Offutt, and R. Alexander, "Testing Web Applications by Modeling with FSMs," Journal of Software and System Modeling, 4(2):326-345.
-
Journal of Software and System Modeling
, vol.4
, Issue.2
, pp. 326-345
-
-
Andrews, A.1
Offutt, J.2
Alexander, R.3
-
20
-
-
0035009417
-
Analysis and Testing of Web Applications
-
rd International Conference on Software Engineering, Toronto, Canada, May 2001, pp. 25-34.
-
rd International Conference on Software Engineering, Toronto, Canada, May 2001
, pp. 25-34
-
-
Ricca, F.1
Tonella, P.2
-
21
-
-
51849093508
-
Light Weight Anti-Phishing with User Whitelisting in a Web Browser
-
Y. Wang, R. Agrawal, and B. Choi, "Light Weight Anti-Phishing with User Whitelisting in a Web Browser," Proc. of the IEEE Region 5 Conference, Kansas City, April 2008, pp. 1-4.
-
Proc. of the IEEE Region 5 Conference, Kansas City, April 2008
, pp. 1-4
-
-
Wang, Y.1
Agrawal, R.2
Choi, B.3
-
22
-
-
49049108873
-
Advanced White List Approach for Preventing Access to Phishing Sites
-
J. Kang and D. Lee, "Advanced White List Approach for Preventing Access to Phishing Sites," Proc. of the Intl. Conf. on Convergence Information Technology, Korea, November 2007, pp. 491-496.
-
Proc. of the Intl. Conf. on Convergence Information Technology, Korea, November 2007
, pp. 491-496
-
-
Kang, J.1
Lee, D.2
-
23
-
-
50049105061
-
A Phishing Sites Blacklist Generator
-
M. sharifi and S. Siadati, "A Phishing Sites Blacklist Generator," Proceedings of International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar, April 2008, pp. 840-843.
-
Proceedings of International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar, April 2008
, pp. 840-843
-
-
Sharifi, M.1
Siadati, S.2
-
24
-
-
77953804362
-
The battle against phishing: Dynamic Security Skins
-
R. Dhamija and J. Tygar, "The battle against phishing: Dynamic Security Skins," Proc. of the Symposium on Usable Privacy and Security, Pittsburgh, USA, July 2005, pp. 77-88.
-
Proc. of the Symposium on Usable Privacy and Security, Pittsburgh, USA, July 2005
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.2
-
25
-
-
84904793179
-
An Empirical Analysis of Phishing Blacklists
-
th Conf. on Email and Anti-Spam, July 2009, California, USA.
-
th Conf. on Email and Anti-Spam, July 2009, California, USA
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.4
Hong, J.5
Zhang, C.6
-
26
-
-
34250786200
-
Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
-
M. Wu, R. Miller, and G. Little, "Web Wallet: Preventing Phishing Attacks by Revealing User Intentions," Proc. of the Symp. On Usable Privacy and Security, July 2006, Pennsylvania, pp. 102-113.
-
Proc. of the Symp. On Usable Privacy and Security, July 2006, Pennsylvania
, pp. 102-113
-
-
Wu, M.1
Miller, R.2
Little, G.3
-
27
-
-
77954835790
-
-
Accessed from
-
Jericho HTML Parser, Accessed from http://jericho.htmlparser.net
-
-
-
-
28
-
-
21244490135
-
Security Technologies go Phishing
-
June
-
D. Geer, "Security Technologies go Phishing," Computer Archive, Volume 38, Issue 6, June 2005, pp. 18-21.
-
(2005)
Computer Archive
, vol.38
, Issue.6
, pp. 18-21
-
-
Geer, D.1
-
30
-
-
67249153096
-
Evolutionary Study of Phishing
-
rd Anti-Phishing Working Group eCrime Researchers Summit, October 2008, Atlanta, Georgia, pp. 1-10.
-
rd Anti-Phishing Working Group ECrime Researchers Summit, October 2008, Atlanta, Georgia
, pp. 1-10
-
-
Irani, D.1
Webb, S.2
Giffin, J.3
Pu, C.4
-
32
-
-
77954850970
-
-
Access form phishtank.org
-
PhishTank, Access form phishtank.org
-
PhishTank
-
-
-
33
-
-
60349123692
-
Modeling Web Browser Interactions and Generating Tests
-
B. Song, H. Miao, and S. Chen, "Modeling Web Browser Interactions and Generating Tests," Proc. of the Intl. Conf. on Computational Intelligence and Security, Suzhou, China, Dec. 2008, pp. 399-404.
-
Proc. of the Intl. Conf. on Computational Intelligence and Security, Suzhou, China, Dec. 2008
, pp. 399-404
-
-
Song, B.1
Miao, H.2
Chen, S.3
-
34
-
-
38049089325
-
Relating Navigation and Request Routing Models in Web Applications
-
th Intl. Conference on Model Driven Engineering Languages and Systems, Nashville, USA, September 2007, pp. 346-359.
-
th Intl. Conference on Model Driven Engineering Languages and Systems, Nashville, USA, September 2007
, pp. 346-359
-
-
Han, M.1
Hofmeister, C.2
-
35
-
-
0034497073
-
Modeling Web Navigation by StateChart
-
th International Computer Software and Applications Conference, Oct 2000, Taipei, Taiwan, pp. 41-47.
-
th International Computer Software and Applications Conference, Oct 2000, Taipei, Taiwan
, pp. 41-47
-
-
Leung, K.1
Hui, L.2
Yiu, S.3
Tang, R.4
-
36
-
-
0142184067
-
Applying Extended Finite State Machines in Software Testing of Interactive Systems
-
M. Fantinato and M. Jino, "Applying Extended Finite State Machines in Software Testing of Interactive Systems," Lecture Notes in Computer Science 2844, pp. 34-45, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2844
, pp. 34-45
-
-
Fantinato, M.1
Jino, M.2
-
37
-
-
37849049401
-
On the Effectiveness of Techniques to Detect Phishing Sites
-
th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Switzerland, pp 20-39, 2007.
-
(2007)
th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Switzerland
, pp. 20-39
-
-
Ludl, C.1
Krueger, C.2
McAllister, S.3
Kirda, E.4
|