-
1
-
-
77955078533
-
-
Alexa Internet Inc.
-
Alexa Internet Privacy Policy, Alexa Internet Inc., http:// www.alexa.com/site/help/privacy?p=TBStartpageWt40 B1.
-
Alexa Internet Privacy Policy
-
-
-
2
-
-
78249254100
-
-
Anti-Phishing Working Group, April
-
Phishing Activity Trends, Anti-Phishing Working Group (April 2007), http://www.antiphishing.org/reports/apwg report April 2007.pdf.
-
(2007)
Phishing Activity Trends
-
-
-
4
-
-
85044841595
-
Client-side defense against web-based identity theft
-
February
-
N. Chou, R. Ledesma, Y. Teraguchi, and J. C. Mitchell, "Client-side Defense Against Web-based Identity Theft," Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), February 2004, http://theory.stanford.edu/;jcm/papers/spoofguard-ndss.pdf.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, R.3
Mitchell, J.C.4
-
5
-
-
85084161366
-
Tor: The second-generation onion router
-
August
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-generation Onion Router," Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 303-320.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, R.2
Syverson, R.3
-
7
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
Alexandria VA
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants," Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), Alexandria, VA, 2007 http://www.icir.org/ vern/papers/miscreant-wealth.ccs07. pdf.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
-
-
Franklin, J.1
Paxson, V.2
Perrig, V.3
Savage, S.4
-
8
-
-
77955059349
-
Information networks and social trust
-
(February)
-
A. A. Friedman, "Information Networks and Social Trust," Social Science Research Network (February 2006), http://papers.ssrn.com/sol3/papers. cfm?abstract-id=882370.
-
(2006)
Social Science Research Network
-
-
Friedman, A.A.1
-
9
-
-
77955062605
-
Case study: Net trust
-
M. Jakobsson and S. Meyers, Eds., John Wiley & Sons, Hoboken, NJ
-
A. Genkina and L. J. Camp, "Case Study: Net Trust," in Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, M. Jakobsson and S. Meyers, Eds., John Wiley & Sons, Hoboken, NJ (2007).
-
(2007)
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
-
-
Genkina, A.1
Camp, L.J.2
-
11
-
-
33749016498
-
Information revelation and privacy in online social networks
-
ACM Press, New York
-
R. Gross, A. Acquisti, and J. H. Heinz, "Information Revelation and Privacy in Online Social Networks," Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES'05), ACM Press, New York (2005), pp. 71-80.
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (WPES'05)
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
Heinz, J.H.3
-
12
-
-
21244497589
-
Social bookmarking tools (I): A general review
-
April
-
T. Hammond, T. Hannay, B. Lund, and J. Scott, "Social Bookmarking Tools (I): A General Review," D-Lib Magazine 11, No.4 (April 2005), http://www.dlib.org/dlib/april05/hammond/04hammond.html.
-
(2005)
D-Lib Magazine
, vol.11
, Issue.4
-
-
Hammond, T.1
Hannay, T.2
Lund, B.3
Scott, J.4
-
15
-
-
77955069356
-
-
Cnet News, (October 17)
-
M. Kotadia, "Samy Opens New Front in Worm War," Cnet News (October 17, 2005), http://news.cnet.com/Samy-opens-new-front-in-worm-war/2100- 7349-3-5897099.html.
-
(2005)
Samy opens new front in worm war
-
-
Kotadia, M.1
-
17
-
-
23844493748
-
Geographic routing in social networks
-
D. Liben-Nowell, J. Novak, R. Kumar, P. Raghavan, and A. Tomkins, "Geographic Routing in Social Networks," Proceedings of the National Academy of Science 102, No.33, 11623-11628 (2005).
-
(2005)
Proceedings of the National Academy of Science
, vol.102
, Issue.33
, pp. 11623-11628
-
-
Liben-Nowell, D.1
Novak, J.2
Kumar, R.3
Raghavan, P.4
Tomkins, A.5
-
21
-
-
0035639140
-
Birds of a feather: Homophily in social networks
-
M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a Feather: Homophily in Social Networks," Annual Review of Sociology 27, No.1, 415-444 (2001).
-
(2001)
Annual Review of Sociology
, vol.27
, Issue.1
, pp. 415-444
-
-
McPherson, M.1
Smith-Lovin, L.2
Cook, J.M.3
-
22
-
-
42549123260
-
Ranking web sites with real user traffic
-
M. Meiss, F. Menczer, S. Fortunato, A. Flammini, and A. Vespignani, "Ranking Web Sites with Real User Traffic," Proceedings of the first International ACM Conference on Web Search and Data Mining (WDSM 2008), 2008, http://velblod.videolectures.net/2008/contrib/wsdm08-stanford/meiss-mark/ wsdm08-meiss-rws-01.ppt.
-
(2008)
Proceedings of the first International ACM Conference on Web Search and Data Mining (WDSM 2008)
-
-
Meiss, M.1
Menczer, F.2
Fortunato, S.3
Flammini, A.4
Vespignani, A.5
-
23
-
-
51149115237
-
Examining the impact of website take-down on phishing
-
Pittsburgh (October)
-
T. Moore and R. Clayton, "Examining the Impact of Website Take-down on Phishing," Anti-Phishing Web Group eCrime Researchers Summit, Pittsburgh (October 2007), http://people.seas.harvard.edu/;tmoore/ ecrime07-pres.pdf.
-
(2007)
Anti-Phishing Web Group eCrime Researchers Summit
-
-
Moore, T.1
Clayton, R.2
-
26
-
-
1142268161
-
Privacy, economics, and price discrimination on the internet
-
ACM Press, New York
-
A. Odlyzko, "Privacy, Economics, and Price Discrimination on the Internet," Proceedings of the 5th International Conference on Electronic Commerce (ICEC '03), ACM Press, New York (2003), pp. 355-366.
-
(2003)
Proceedings of the 5th International Conference on Electronic Commerce (ICEC '03)
, pp. 355-366
-
-
Odlyzko, A.1
-
28
-
-
77955060984
-
-
StumbleUpon.com (October)
-
StumbleUpon Privacy Policy, StumbleUpon.com (October 2007), http://www.stumbleupon.com/privacy.html.
-
(2007)
StumbleUpon Privacy Policy
-
-
-
29
-
-
84898190494
-
Phinding phish: Evaluating anti-phishing tools
-
March
-
Y. Zhang, S. Egelman, L. Cranor, and J. Hong, "Phinding Phish: Evaluating Anti-Phishing Tools," Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS 2007), March 2007, http://lorrie.cranor.org/pubs/ndss-phish-tools-final.pdf.
-
(2007)
Proceedings of the 14th Annual Network & Distributed System Security Symposium (NDSS 2007)
-
-
Zhang, Y.1
Egelman, S.2
Cranor, S.3
Hong, J.4
|