-
1
-
-
34548344520
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group, Phishing Activity Trends Report. 2006 http://www.antiphishing.org/reports/apwg_report_june_06.pdf.
-
(2006)
Phishing Activity Trends Report
-
-
-
2
-
-
84863159264
-
Phishing costs nearly $1 billion
-
Visited Nov
-
G. Keizer. Phishing Costs Nearly $1 Billion. TechWeb Technology News. Visited: Nov 20, 2006 http://www.techweb.com/wire/security/164902671.
-
(2006)
Tech web Technology News
, pp. 20
-
-
Keizer, G.1
-
3
-
-
84863146498
-
-
http://www.networkworld.com/news/2006/110906-gartner-consumers-to-lose-28b.html.
-
-
-
-
4
-
-
84863173164
-
-
http://www.antiphishing.org/reports/apwg_report_oct_2007.pdf.
-
-
-
-
5
-
-
84863159265
-
-
eBay Inc, Visited: Nov 20
-
eBay Inc., Using eBay Toolbar's Account Guard. Visited: Nov 20, 2006. http://pages.ebay.com/help/confidence/account-guard.html.
-
(2006)
Using EBay Toolbar's Account Guard
-
-
-
6
-
-
38549169196
-
-
Google Inc, Visited: Nov 20
-
Google Inc., Google Safe Browsing for Firefox. Visited: Nov 20, 2006. http://www.google.com/tools/firefox/safebrowsing/.
-
(2006)
Google Safe Browsing for Firefox
-
-
-
7
-
-
84898190494
-
Phinding Phish: Evaluating anti- phishing tools
-
February 28- March 2
-
Yue Zhang, Serge Egelman, Lorrie Cranor, Jason Hong, "Phinding Phish: Evaluating Anti- Phishing Tools", In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS '07). February 28- March 2, 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS '07)
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
8
-
-
70349255573
-
Anti-phishing Based on automated individual white-list
-
Ye Cao, Weili Han, Yueran Le, "Anti-phishing Based on Automated Individual White-list", In Proceedings of the 4th ACM workshop on Digital identity management, pp.51-60, 2008.
-
(2008)
Proceedings of the 4th ACM Workshop on Digital Identity Management
, pp. 51-60
-
-
Ye, C.1
Han, W.2
Le, Y.3
-
9
-
-
77952223597
-
Using domain top-page similarity feature in machine learning-based web phishing detection
-
Nuttapong Sanglerdsinlapachai, Arnon Rungsawang, "Using Domain Top-page Similarity Feature in Machine Learning-based Web Phishing Detection", WKDD 2010, pp.187-190, 2010.
-
(2010)
WKDD
, vol.2010
, pp. 187-190
-
-
Sanglerdsinlapachai, N.1
Rungsawang, A.2
-
12
-
-
33744764278
-
Robust and secure image hashing
-
Ashwin Swaminathan, Yinian Mao, Min Wu, "Robust and Secure Image Hashing", IEEE Transaction on Information Forensics and Security, Vol. 1, No. 2, pp.215-230, 2006.
-
(2006)
IEEE Transaction on Information Forensics and Security
, vol.1
, Issue.2
, pp. 215-230
-
-
Swaminathan, A.1
Mao, Y.2
Min, W.3
-
15
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on earth mover's distance (emd)
-
Anthony Y. Fu, Wenyin Liu, Xiaotie Deng, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)" IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 4, pp.301-311, 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Liu, W.2
Deng, X.3
-
16
-
-
77953636660
-
Detecting visually similar web pages: Application to phishing detection
-
Teh-Chung Chen, ScottDick, James Miller, "Detecting Visually Similar Web Pages: Application to Phishing Detection", ACM Transactions on Internet Technology, Vol. 10, No. 2, 2010.
-
(2010)
ACM Transactions on Internet Technology
, vol.10
, Issue.2
-
-
Chen, T.-C.1
Scottdick, J.M.2
-
18
-
-
79952781257
-
DWT-PCA (EVD) based copy-move image forgery detection
-
Michael Zimba, Xingming Sun, "DWT-PCA (EVD) Based Copy-move Image Forgery Detection", JDCTA, Vol. 5, No. 1, pp.251-258, 2011.
-
(2011)
JDCTA
, vol.5
, Issue.1
, pp. 251-258
-
-
Zimba, M.1
Sun, X.2
-
19
-
-
80052490211
-
Estimation of translation, rotation and scaling based on multiple motion estimations
-
Kyota Aoki, "Estimation of Translation, Rotation and Scaling Based on Multiple Motion Estimations", JNIT, Vol. 2, No. 1, pp.49-57, 2011.
-
(2011)
JNIT
, vol.2
, Issue.1
, pp. 49-57
-
-
Aoki, K.1
-
20
-
-
79952388302
-
A fast document image denoising method based on packed binary format and source word accumulation
-
Yudong Zhang, Lenan Wu, "A Fast Document Image Denoising Method based on Packed Binary Format and Source Word Accumulation", JCIT, Vol. 6, No. 2, pp.131-137, 2011.
-
(2011)
JCIT
, vol.6
, Issue.2
, pp. 131-137
-
-
Zhang, Y.1
Lenan, W.2
-
21
-
-
79956195174
-
Obscene image detection algorithm using high- and low- quality images
-
Myoung Beom Chung, II Ju Ko, "Obscene Image Detection Algorithm Using High- and Low- Quality Images", IJEI, Vol. 2, No. 1, pp.13-20, 2011.
-
(2011)
IJEI
, vol.2
, Issue.1
, pp. 13-20
-
-
Chung, M.B.1
Ko II, J.2
-
22
-
-
79956221730
-
A new robust watermarking scheme based on RDWT-SVD
-
Samira Lagzian, Mohsen Soryani, Mahmood Fathy, "A New Robust Watermarking Scheme Based on RDWT-SVD", IJIIP, Vol. 2, No. 1, pp.22-29, 2011.
-
(2011)
IJIIP
, vol.2
, Issue.1
, pp. 22-29
-
-
Lagzian, S.1
Soryani, M.2
Fathy, M.3
-
23
-
-
34748877099
-
Why phishing works
-
Rachna Dhamija, J. D. Tygar, Marti Hearst, "Why Phishing Works", In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.22-28, 2006.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 22-28
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
24
-
-
77952390965
-
Fighting phishing with trusted email
-
Jordan Crain, Lukasz Opyrchal, Atul Prakash, "Fighting Phishing with Trusted Email", ARES, pp.462-467, 2010.
-
(2010)
ARES
, pp. 462-467
-
-
Crain, J.1
Opyrchal, L.2
Prakash, A.3
|