-
1
-
-
85070848126
-
Trustworthiness Testing of Phishing Websites: A behavioral Model-based Approach
-
March Elsevier
-
H. Shahriar and M. Zulkernine, "Trustworthiness Testing of Phishing Websites: A behavioral Model-based Approach,"Future Generation Computer Systems, March 2011, Elsevier.
-
(2011)
Future Generation Computer Systems
-
-
Shahriar, H.1
Zulkernine, M.2
-
2
-
-
77954841986
-
PhishTester: Automatic Testing of Phishing Attacks
-
H. Shahriar and M. Zulkernine, "PhishTester: Automatic Testing of Phishing Attacks," Proc. of Conf. on Secure Soft. Integration and Reliability Improvement, Singapore, Jun 2010, pp. 198-207.
-
Proc. of Conf. on Secure Soft. Integration and Reliability Improvement, Singapore, Jun 2010
, pp. 198-207
-
-
Shahriar, H.1
Zulkernine, M.2
-
3
-
-
60649094724
-
Anti-Phishing in Offense and Defense
-
C. Yue and H. Wang, "Anti-Phishing in Offense and Defense," Proc. of ACSAC, California, Dec 2008, p. 345-354.
-
Proc. of ACSAC, California, Dec 2008
, pp. 345-354
-
-
Yue, C.1
Wang, H.2
-
4
-
-
70349323626
-
User Behavior-based Phishing Websites Detection
-
X. Dong, J. A Clark, and J. Jacob, "User Behavior-based Phishing Websites Detection," Proc. of Intl. Multi. on Comp. Sci. and Info. Tech., Wisla, Poland, Oct 2008, pp. 783-790.
-
Proc. of Intl. Multi. on Comp. Sci. and Info. Tech., Wisla, Poland, Oct 2008
, pp. 783-790
-
-
Dong, X.1
Clark, J.A.2
Jacob, J.3
-
5
-
-
35348905575
-
CANTINA: A Contentbased Approach Detecting Phishing Websites
-
Y. Zhang, J. Hong, and L. Cranor, "CANTINA: A Contentbased Approach Detecting Phishing Websites," Proc. of World Wide Web, Banff, Alberta, May 2007, pp. 639-648.
-
Proc. of World Wide Web, Banff, Alberta, May 2007
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
-
6
-
-
80053017582
-
-
Accessed form
-
PhishTank, Accessed form http://phishtank.org
-
-
-
-
7
-
-
51849093508
-
Light Weight Anti- Phishing with User Whitelisting in a Web Browser
-
Y. Wang, R. Agrawal, and B. Choi, "Light Weight Anti- Phishing with User Whitelisting in a Web Browser," Proc. of the IEEE Region 5 Conf., Kansas City, April 2008, pp. 1-4.
-
Proc. of the IEEE Region 5 Conf., Kansas City, April 2008
, pp. 1-4
-
-
Wang, Y.1
Agrawal, R.2
Choi, B.3
-
8
-
-
49049108873
-
Advanced White List Approach for Preventing Access to Phishing Sites
-
J. Kang and D. Lee, "Advanced White List Approach for Preventing Access to Phishing Sites," Proc. of the Intl. Conf. on Conv. Info. Tech., Korea, November 2007, pp. 491-496.
-
Proc. of the Intl. Conf. on Conv. Info. Tech., Korea, November 2007
, pp. 491-496
-
-
Kang, J.1
Lee, D.2
-
9
-
-
21244490135
-
Security Technologies go Phishing
-
June
-
D. Geer, "Security Technologies go Phishing," Computer Archive, Volume 38, Issue 6, June 2005, pp. 18-21.
-
(2005)
Computer Archive
, vol.38
, Issue.6
, pp. 18-21
-
-
Geer, D.1
-
10
-
-
35348913799
-
Learning to Detect Phishing Emails
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to Detect Phishing Emails," Proc. of WWW, Alberta, 2007, p. 649-656.
-
Proc. of WWW, Alberta, 2007
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
11
-
-
33845926633
-
PHONEY: Mimicking User Response to Detect Phishing Attacks
-
M. Chandrasekaran, R. Chinchani, and S. Upadhyaya, "PHONEY: Mimicking User Response to Detect Phishing Attacks," Proc. of Symp. on World of Wireless, Mobile and Multi. Networks, 2006, Niagara-Falls, Jun 2006, p. 668-672.
-
Proc. of Symp. on World of Wireless, Mobile and Multi. Networks, 2006, Niagara-Falls, Jun 2006
, pp. 668-672
-
-
Chandrasekaran, M.1
Chinchani, R.2
Upadhyaya, S.3
-
12
-
-
77953804362
-
The battle against phishing: Dynamic Security Skins
-
R. Dhamija and J. Tygar, "The battle against phishing: Dynamic Security Skins," Proc. of SOUPS, Pittsburgh, July 2005, pp. 77-88.
-
Proc. of SOUPS, Pittsburgh, July 2005
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.2
-
13
-
-
51349089199
-
A Layout-Similarity-Based Approach for Detecting Phishing Pages
-
rd Intl. Conf. on Security and Privacy in Communication Networks, France, Sept 2007, pp. 454-463.
-
rd Intl. Conf. on Security and Privacy in Communication Networks, France, Sept 2007
, pp. 454-463
-
-
Rosiello, A.1
Krida, E.2
Kruegel, C.3
Ferrandi, F.4
-
14
-
-
80052989312
-
-
Anti-Phishing Working Group, http://www.antiphishing.org.
-
-
-
-
15
-
-
80053003800
-
-
Internet Explorer 8
-
Internet Explorer 8, http://www.microsoft.com/
-
-
-
-
16
-
-
39049164431
-
Anomaly-based Web Phishing Page Detection
-
Y. Pan and X. Ding, "Anomaly-based Web Phishing Page Detection", Proc. of ACSAC, Miami, Dec 2006, pp. 381-392.
-
Proc. of ACSAC, Miami, Dec 2006
, pp. 381-392
-
-
Pan, Y.1
Ding, X.2
-
19
-
-
78149484030
-
Automatic Detection of Phishing Target from Phishing Webpage
-
G. Liu, B. Qiu, and L. Wenyin, "Automatic Detection of Phishing Target from Phishing Webpage," Proc. of Conf. on Pattern Recognition, Istanbul, Aug 2010, pp.4153-4156.
-
Proc. of Conf. on Pattern Recognition, Istanbul, Aug 2010
, pp. 4153-4156
-
-
Liu, G.1
Qiu, B.2
Wenyin, L.3
-
20
-
-
67249152321
-
Automating Phishing Website Identification through Deep MD5 Matching
-
B. Wardman and G. Warner, "Automating Phishing Website Identification through Deep MD5 Matching," eCrime Researchers Summit, Atlanta, October 2008, pp. 1-7.
-
eCrime Researchers Summit, Atlanta, October 2008
, pp. 1-7
-
-
Wardman, B.1
Warner, G.2
-
21
-
-
80052975275
-
-
Mozilla Firefox, http://www.mozilla.com/en-US/firefox.
-
-
-
-
22
-
-
70449416139
-
Attribute-based Prevention of Phishing Attacks
-
th Int. Symp. on Network Comp. and App., Cambridge, MA, July 2009, pp.266-269.
-
th Int. Symp. on Network Comp. and App., Cambridge, MA, July 2009
, pp. 266-269
-
-
Atighetchi, M.1
Pal, P.2
-
23
-
-
84904793179
-
An Empirical Analysis of Phishing Blacklists
-
th Conf. on Email and Anti-spam, CA, July 2009.
-
th Conf. on Email and Anti-spam, CA, July 2009
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.4
Hong, J.5
Zhang, C.6
-
24
-
-
51249089888
-
B-APT: Bayesian Anti-Phishing Toolbar
-
P. Likarish, D. Dunbar, and T. Hansen, "B-APT: Bayesian Anti-Phishing Toolbar," Proc. of Intl. Conf. on Communications, Beijing, May 2008, pp. 1745-1749.
-
Proc. of Intl. Conf. on Communications, Beijing, May 2008
, pp. 1745-1749
-
-
Likarish, P.1
Dunbar, D.2
Hansen, T.3
-
25
-
-
62449094173
-
PhishGuard: A Browser Plug-in for Protection from Phishing
-
Y. Joshi, S. Saklikar, D. Das, and S. Saha, "PhishGuard: A Browser Plug-in for Protection from Phishing", Conf. on Internet Multi. Serv. Archi. and App., India, Dec 2008, p.1-6.
-
Conf. on Internet Multi. Serv. Archi. and App., India, Dec 2008
, pp. 1-6
-
-
Joshi, Y.1
Saklikar, S.2
Das, D.3
Saha, S.4
-
26
-
-
33645115367
-
Phishing Web page Detection
-
L. Wenyin, G. Huang, L. Xiaoyue, X. Deng, and Z. Min, "Phishing Web page Detection," Proc. of Conf. on Document Analysis and Recognition, Aug 2005, Seoul, pp. 560-564.
-
Proc. of Conf. on Document Analysis and Recognition, Aug 2005, Seoul
, pp. 560-564
-
-
Wenyin, L.1
Huang, G.2
Xiaoyue, L.3
Deng, X.4
Min, Z.5
-
27
-
-
84865616735
-
A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval
-
G.Xiang and J. Hong, "A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval," Proc. of the World Wide Web, Madrid, Spain, April 2009, pp. 571-580.
-
Proc. of the World Wide Web, Madrid, Spain, April 2009
, pp. 571-580
-
-
Xiang, G.1
Hong, J.2
-
28
-
-
70449526286
-
Discovering Phishing Target based on Semantic Link Network
-
Elsevier, March
-
L. Wenyin, N. Fang, X. Quan, B. Qiu, and G. Liu, "Discovering Phishing Target based on Semantic Link Network," Future Generation Computer Systems, Elsevier, Volume 26, Issue 3, March 2010, pp. 381-388.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.3
, pp. 381-388
-
-
Wenyin, L.1
Fang, N.2
Quan, X.3
Qiu, B.4
Liu, G.5
-
29
-
-
33645131523
-
An Antiphishing Strategy Based on Visual Similarity Assessment
-
March
-
W. Liu, G. Huang, G. Huang, and A. Fu, "An Antiphishing Strategy Based on Visual Similarity Assessment," IEEE Internet Computing, Vol. 10, Issue 2, March 2006, pp. 58-65.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.2
, pp. 58-65
-
-
Liu, W.1
Huang, G.2
Huang, G.3
Fu, A.4
-
30
-
-
70350630557
-
Beyond Blacklists: Learning to Detect Malicious Websites from Suspicious URLs
-
J. Ma, L. Saul, S. Savag, and G. Voelker, "Beyond Blacklists: Learning to Detect Malicious Websites from Suspicious URLs," Proc. of KDD, Paris, Jun 2009, p. 1245-1254.
-
Proc. of KDD, Paris, Jun 2009
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.2
Savag, S.3
Voelker, G.4
-
31
-
-
67650466366
-
Visual Similaritybased Phishing Detection without Victim Site Information
-
M. Hara, A. Yamada, and Y. Miyake, "Visual Similaritybased Phishing Detection without Victim Site Information,"Symp. on Comp. Intelligence in Cyber Security, Nashville, TN, March 2009, pp. 30-36..
-
Symp. on Comp. Intelligence in Cyber Security, Nashville, TN, March 2009
, pp. 30-36
-
-
Hara, M.1
Yamada, A.2
Miyake, Y.3
-
32
-
-
77954398849
-
A DNS-based Anti- Phishing Approach
-
S. Bin, W. Qiaoyan, and L. Xiaoying, "A DNS-based Anti- Phishing Approach," Proc. of the Networks Security Wireless Comm. and Trusted Comp., Wuhan, Apr 2010, pp. 262-265.
-
Proc. of the Networks Security Wireless Comm. and Trusted Comp., Wuhan, Apr 2010
, pp. 262-265
-
-
Bin, S.1
Qiaoyan, W.2
Xiaoying, L.3
-
33
-
-
70849122792
-
Phishpin: An Identity-based Anti-Phishing Approach
-
H. Tout and W. Hafner, "Phishpin: An Identity-based Anti- Phishing Approach," Proc. of the Conf. on Computational Sci. and Engg., Vancouver, Aug 2009, pp. 347-352.
-
Proc. of the Conf. on Computational Sci. and Engg., Vancouver, Aug 2009
, pp. 347-352
-
-
Tout, H.1
Hafner, W.2
-
34
-
-
72449205441
-
Identifying Vulnerable Websites by Analysis of Common Strings in Phishing URLs
-
B. Wardman, G. Skukla, and G. Warner, "Identifying Vulnerable Websites by Analysis of Common Strings in Phishing URLs," eCrime Researchers Summit, Tacoma, Sept 2009, pp. 1-13.
-
eCrime Researchers Summit, Tacoma, Sept 2009
, pp. 1-13
-
-
Wardman, B.1
Skukla, G.2
Warner, G.3
-
35
-
-
77953329477
-
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
-
P. Prakash, M. Kumar, R. Kompella, and M. Gupta, "PhishNet: Predictive Blacklisting to Detect Phishing Attacks," Proc. of INFOCOM, California, Mar 2010, pp. 1-5.
-
Proc. of INFOCOM, California, Mar 2010
, pp. 1-5
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.3
Gupta, M.4
-
36
-
-
78649836899
-
Winning the Phishing War
-
S. McCombie, and J. Pieprzyk, "Winning the Phishing War,"Proc. of Cybercrime and Trustworthy Computing Workshop, Victoria, Australia, July 2010, pp.79-86.
-
Proc. of Cybercrime and Trustworthy Computing Workshop, Victoria, Australia, July 2010
, pp. 79-86
-
-
McCombie, S.1
Pieprzyk, J.2
-
37
-
-
78249256663
-
A Culture of Trust Threatens Security and Privacy in Qatar
-
M. Al-Hamar, R. Dawson, and L. Guan, "A Culture of Trust Threatens Security and Privacy in Qatar," Proc. of Intl. Conf. on Comp. and Info. Tech., Bradford, Jun 2010, pp. 991-995.
-
Proc. of Intl. Conf. on Comp. and Info. Tech., Bradford, Jun 2010
, pp. 991-995
-
-
Al-Hamar, M.1
Dawson, R.2
Guan, L.3
-
39
-
-
70449624176
-
PhishCatch-A Phishing Detection Tool
-
W. Yu, S. Nargundkar, and N. Tiruthani, "PhishCatch-A Phishing Detection Tool," Proc. of COMPSAC, Seattle, July 2009, Vol. 2, pp.451-456.
-
Proc. of COMPSAC, Seattle, July 2009
, vol.2
, pp. 451-456
-
-
Yu, W.1
Nargundkar, S.2
Tiruthani, N.3
-
40
-
-
34250786200
-
Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
-
M. Wu, R. Miller, and G. Little, "Web Wallet: Preventing Phishing Attacks by Revealing User Intentions," Symp. On Usable Privacy and Security, Jul 2006, Pittsburgh, p.102-113.
-
Symp. On Usable Privacy and Security, Jul 2006, Pittsburgh
, pp. 102-113
-
-
Wu, M.1
Miller, R.2
Little, G.3
-
41
-
-
77955356224
-
Blocking Foxy Phishing Emails with Historical Information
-
Y. Wu, Z. Zhao, Y. Qiu, and F. Bao, "Blocking Foxy Phishing Emails with Historical Information," Proc. of the Conf. on Communications, Cape Town, May 2010, pp. 1-5.
-
Proc. of the Conf. on Communications, Cape Town, May 2010
, pp. 1-5
-
-
Wu, Y.1
Zhao, Z.2
Qiu, Y.3
Bao, F.4
-
42
-
-
34248554408
-
Protecting Users Against Phishing Attacks with AntiPhish
-
E. Kirda and C. Kruegel, "Protecting Users Against Phishing Attacks with AntiPhish," Proc. of the COMPSAC, Edinburgh, July 2005, pp. 517-524.
-
Proc. of the COMPSAC, Edinburgh, July 2005
, pp. 517-524
-
-
Kirda, E.1
Kruegel, C.2
-
43
-
-
77954482431
-
GoldPhish: Using Images for Content-based Phishing Analysis
-
M. Dunlop, S. Groat, and D. Shelly, "GoldPhish: Using Images for Content-based Phishing Analysis," Proc. of Intl. Conf. on Internet Monitoring and Protection, Barcelona, Spain, May 2010, pp. 123-128.
-
Proc. of Intl. Conf. on Internet Monitoring and Protection, Barcelona, Spain, May 2010
, pp. 123-128
-
-
Dunlop, M.1
Groat, S.2
Shelly, D.3
-
44
-
-
37849049401
-
On the Effectiveness of Techniques to Detect Phishing Sites
-
C. Ludl, C. Krueger, S. McAllister, E. Kirda, "On the Effectiveness of Techniques to Detect Phishing Sites," Proc. of DIMVA, Switzerland, July 2007, pp. 20-39.
-
Proc. of DIMVA, Switzerland, July 2007
, pp. 20-39
-
-
Ludl, C.1
Krueger, C.2
McAllister, S.3
Kirda, E.4
-
45
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
M. Wu, R. Miller, and S. Garfinkel, "Do security toolbars actually prevent phishing attacks?" Proc. of the SIGCHI, Montreal, Canada, April 2006, pp. 601-610.
-
Proc. of the SIGCHI, Montreal, Canada, April 2006
, pp. 601-610
-
-
Wu, M.1
Miller, R.2
Garfinkel, S.3
|