-
1
-
-
79960149921
-
-
Anti-Phishing Working Group (APWG) (2011), http://www.antiphishing.org
-
(2011)
-
-
-
2
-
-
45849130178
-
Method for evaluating the security risk of a website against phishing attacks
-
Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. Springer, Heidelberg
-
Kim, Y.-G., Cho, S.-H., Lee, J.-S., Lee, M.-S., Kim, I.H., Kim, S.H.: Method for evaluating the security risk of a website against phishing attacks. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 21-31. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5075
, pp. 21-31
-
-
Kim, Y.-G.1
Cho, S.-H.2
Lee, J.-S.3
Lee, M.-S.4
Kim, I.H.5
Kim, S.H.6
-
3
-
-
79960135229
-
-
Microsoft, Sender ID Framework Overview (2011), http://www.microsoft.com/ mscorp/safety/technologies/senderid/default.mspx
-
(2011)
Sender ID Framework Overview
-
-
-
5
-
-
79960141268
-
-
Mutual Internet Practices Association
-
Mutual Internet Practices Association, DomainKeys Identified Mail, DKIM (2011), http://www.dkim.org
-
(2011)
-
-
-
7
-
-
25144519584
-
Phish and Hips: Human Interactive Proofs to Detect Phishing Attacks
-
Dhamija, R., Tygar, J.D.: Phish and Hips: Human Interactive Proofs to Detect Phishing Attacks. In: Proc. of the Second International Workshop, pp. 127-141 (2005)
-
(2005)
Proc. of the Second International Workshop
, pp. 127-141
-
-
Dhamija, R.1
Tygar, J.D.2
-
8
-
-
33751538239
-
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
-
Fu, A.Y., Wenyin, L., Deng, X.: Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). IEEE Transactions on Dependable and Secure Computing 3(4), 301-311 (2006)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Wenyin, L.2
Deng, X.3
-
9
-
-
33645131523
-
An Antiphishing Strategy Based on Visual Similarity Assessment
-
Liu, W., Deng, X., Huang, G., Fu, A.Y.: An Antiphishing Strategy Based on Visual Similarity Assessment. IEEE Internet Computing, 58-65 (2006)
-
(2006)
IEEE Internet Computing
, pp. 58-65
-
-
Liu, W.1
Deng, X.2
Huang, G.3
Fu, A.Y.4
-
10
-
-
38549125103
-
Building Anti-Phishing Browser Plug-Ins: An Experience Report
-
Raffetseder, T., Kirda, E., Kruegel, C.: Building Anti-Phishing Browser Plug-Ins: An Experience Report. In: Proc. of third international workshop on Software Engineering for Secure Systems, SESS 2007 (2007)
-
Proc. of Third International Workshop on Software Engineering for Secure Systems, SESS 2007 (2007)
-
-
Raffetseder, T.1
Kirda, E.2
Kruegel, C.3
-
12
-
-
79960149472
-
-
NetCraft (2011), http://www.netcraft.com
-
(2011)
-
-
-
13
-
-
79960129882
-
-
EarthLink (2011), http://www.earthlink.com
-
(2011)
-
-
-
14
-
-
79960119091
-
-
Microsoft, Anti-Phishing Technology (2011), http://www.microsoft.com/ mscorp/safety/technologies/antiphishing/
-
(2011)
Anti-Phishing Technology
-
-
-
15
-
-
34250786200
-
Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
-
ACM Press, New York
-
Wu, M., Miller, R.C., Little, G.: Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. In: Proc. of Symposium On Usable Privacy and Security (SOUPS 2006), pp. 102-113. ACM Press, New York (2006)
-
(2006)
Proc. of Symposium on Usable Privacy and Security (SOUPS 2006)
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
|