메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3-10

SpoofKiller: You can teach people how to pay, but not how to pay attention

Author keywords

[No Author keywords available]

Indexed keywords

FRAUDSTERS;

EID: 84871984931     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/STAST.2012.12     Document Type: Conference Paper
Times cited : (3)

References (29)
  • 2
    • 84871995848 scopus 로고    scopus 로고
    • November 19
    • P. Daniel. Android users demographics, November 19, 2010, http://www.phonearena.com/news/Android-users-demographics-id14786/.
    • (2010) Android Users Demographics
    • Daniel, P.1
  • 5
    • 0011192576 scopus 로고    scopus 로고
    • Technical Report 540-96 revised Feb. Department of Computer Science
    • E. W. Felten, D. Balfanz, D. Dean, and D. S. Wallach. Web spoofing: An internet con game, Technical Report 540-96 (revised Feb. 1997), Department of Computer Science, Princeton University http://www.cs.princeton.edu/sip/pub/ spoofing.pdf.
    • (1997) Web Spoofing: An Internet Con Game
    • Felten, E.W.1    Balfanz, D.2    Dean, D.3    Wallach, D.S.4
  • 11
    • 57849132173 scopus 로고    scopus 로고
    • Why Johnny can't surf (safely)? Attacks and defenses for web users
    • A. Herzberg. Why Johnny can't surf (safely)? Attacks and defenses for web users. Computers & Security, pages 63-71, 2009.
    • (2009) Computers & Security , pp. 63-71
    • Herzberg, A.1
  • 12
    • 34250765199 scopus 로고    scopus 로고
    • Security and identification indicators for browsers against spoofing and phishing attacks
    • ePrint Archive, Report 2004/155
    • A. Herzberg and A. Gbara. Security and identification indicators for browsers against spoofing and phishing attacks. Cryptology ePrint Archive, Report 2004/155, 2004.
    • (2004) Cryptology
    • Herzberg, A.1    Gbara, A.2
  • 18
    • 84863094928 scopus 로고    scopus 로고
    • Security education against phishing: A modest proposal for a major re-think
    • PrePrints
    • I. Kirlappos and M. A. Sasse. Security education against phishing: A modest proposal for a major re-think. IEEE Security and Privacy, 99(PrePrints), 2011.
    • (2011) IEEE Security and Privacy , vol.99
    • Kirlappos, I.1    Sasse, M.A.2
  • 20
    • 61849133288 scopus 로고    scopus 로고
    • Seeing is believing; using camera phones for human verifiable authentication
    • February
    • J. M. McCune, A. Perrig, and M. K. Reiter. Seeing is believing; using camera phones for human verifiable authentication. Int. J. Secur. Netw., 4:43-56, February 2009.
    • (2009) Int. J. Secur. Netw. , vol.4 , pp. 43-56
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 21
  • 23
    • 41949111662 scopus 로고    scopus 로고
    • Using cartoons to teach Internet security
    • S. Srikwan and M. Jakobsson. Using cartoons to teach Internet security. Cryptologia, 32(2):137-154, 2008.
    • (2008) Cryptologia , vol.32 , Issue.2 , pp. 137-154
    • Srikwan, S.1    Jakobsson, M.2
  • 24
    • 79952291854 scopus 로고    scopus 로고
    • Understanding scam victims: Seven principles for systems security
    • Mar.
    • F. Stajano and P. Wilson. Understanding scam victims: seven principles for systems security. Commun. ACM, 54:70-75, Mar. 2011.
    • (2011) Commun. ACM , vol.54 , pp. 70-75
    • Stajano, F.1    Wilson, P.2
  • 26
    • 32244434492 scopus 로고    scopus 로고
    • Gathering evidence: Use of visual security cues in web browsers
    • School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, Canadian Human-Computer Communications Society
    • T. Whalen and K. M. Inkpen. Gathering evidence: use of visual security cues in web browsers. In Proceedings of Graphics Interface 2005, GI '05, pages 137-144, School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, 2005. Canadian Human-Computer Communications Society.
    • (2005) Proceedings of Graphics Interface 2005, GI '05 , pp. 137-144
    • Whalen, T.1    Inkpen, K.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.