-
2
-
-
84871995848
-
-
November 19
-
P. Daniel. Android users demographics, November 19, 2010, http://www.phonearena.com/news/Android-users-demographics-id14786/.
-
(2010)
Android Users Demographics
-
-
Daniel, P.1
-
3
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
New York, NY, USA, ACM
-
R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In Proceedings of the 2005 symposium on Usable privacy and security, SOUPS '05, pages 77-88, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS '05
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
4
-
-
33745816410
-
Why phishing works
-
New York, NY, USA, ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, CHI '06, pages 581-590, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '06
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
5
-
-
0011192576
-
-
Technical Report 540-96 revised Feb. Department of Computer Science
-
E. W. Felten, D. Balfanz, D. Dean, and D. S. Wallach. Web spoofing: An internet con game, Technical Report 540-96 (revised Feb. 1997), Department of Computer Science, Princeton University http://www.cs.princeton.edu/sip/pub/ spoofing.pdf.
-
(1997)
Web Spoofing: An Internet Con Game
-
-
Felten, E.W.1
Balfanz, D.2
Dean, D.3
Wallach, D.S.4
-
6
-
-
35348913799
-
Learning to detect phishing emails
-
New York, NY, USA, ACM
-
I. Fette, N. Sadeh, and A. Tomasic. Learning to detect phishing emails. In Proceedings of the 16th international conference on World Wide Web, WWW '07, pages 649-656, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web, WWW '07
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
8
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
New York, NY, USA, ACM
-
S. Garera, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pages 1-8, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM '07
, pp. 1-8
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
9
-
-
77953753799
-
Johnny 2: A user test of key continuity management with s/mime and outlook express
-
New York, NY, USA, ACM
-
S. L. Garfinkel and R. C. Miller. Johnny 2: a user test of key continuity management with s/mime and outlook express. In Proceedings of the 2005 symposium on Usable privacy and security, SOUPS '05, pages 13-24, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS '05
, pp. 13-24
-
-
Garfinkel, S.L.1
Miller, R.C.2
-
11
-
-
57849132173
-
Why Johnny can't surf (safely)? Attacks and defenses for web users
-
A. Herzberg. Why Johnny can't surf (safely)? Attacks and defenses for web users. Computers & Security, pages 63-71, 2009.
-
(2009)
Computers & Security
, pp. 63-71
-
-
Herzberg, A.1
-
12
-
-
34250765199
-
Security and identification indicators for browsers against spoofing and phishing attacks
-
ePrint Archive, Report 2004/155
-
A. Herzberg and A. Gbara. Security and identification indicators for browsers against spoofing and phishing attacks. Cryptology ePrint Archive, Report 2004/155, 2004.
-
(2004)
Cryptology
-
-
Herzberg, A.1
Gbara, A.2
-
14
-
-
38549121705
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
Berlin, Heidelberg, Springer-Verlag
-
C. Jackson, D. R. Simon, D. S. Tan, and A. Barth. An evaluation of extended validation and picture-in-picture phishing attacks. In Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, FC'07/USEC'07, pages 281-293, Berlin, Heidelberg, 2007. Springer-Verlag.
-
(2007)
Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, FC'07/USEC'07
, pp. 281-293
-
-
Jackson, C.1
Simon, D.R.2
Tan, D.S.3
Barth, A.4
-
15
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94-100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
16
-
-
34249852316
-
Designing ethical phishing experiments: A study of (ROT13) rOnl query features
-
New York, NY, USA, ACM
-
M. Jakobsson and J. Ratkiewicz. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In WWW '06: Proceedings of the 15th international conference on World Wide Web, pages 513-522, New York, NY, USA, 2006. ACM.
-
(2006)
WWW '06: Proceedings of the 15th International Conference on World Wide Web
, pp. 513-522
-
-
Jakobsson, M.1
Ratkiewicz, J.2
-
17
-
-
38549134858
-
What instills trust? A qualitative study of phishing
-
Springer-Verlag
-
M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y.-K. Lim. What instills trust? a qualitative study of phishing. In FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pages 356-361. Springer-Verlag, 2007.
-
(2007)
FC'07/USEC'07: Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security
, pp. 356-361
-
-
Jakobsson, M.1
Tsow, A.2
Shah, A.3
Blevis, E.4
Lim, Y.-K.5
-
18
-
-
84863094928
-
Security education against phishing: A modest proposal for a major re-think
-
PrePrints
-
I. Kirlappos and M. A. Sasse. Security education against phishing: A modest proposal for a major re-think. IEEE Security and Privacy, 99(PrePrints), 2011.
-
(2011)
IEEE Security and Privacy
, vol.99
-
-
Kirlappos, I.1
Sasse, M.A.2
-
19
-
-
77953876778
-
Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer
-
New York, NY, USA, ACM
-
P. Kumaraguru, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti, L. F. Cranor, and J. Hong. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. In Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, eCrime '07, pages 70-81, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the Anti-phishing Working Groups 2nd Annual ECrime Researchers Summit, ECrime '07
, pp. 70-81
-
-
Kumaraguru, P.1
Rhee, Y.2
Sheng, S.3
Hasan, S.4
Acquisti, A.5
Cranor, L.F.6
Hong, J.7
-
20
-
-
61849133288
-
Seeing is believing; using camera phones for human verifiable authentication
-
February
-
J. M. McCune, A. Perrig, and M. K. Reiter. Seeing is believing; using camera phones for human verifiable authentication. Int. J. Secur. Netw., 4:43-56, February 2009.
-
(2009)
Int. J. Secur. Netw.
, vol.4
, pp. 43-56
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
22
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Berkeley, CA, USA, USENIX Association
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, pages 2-2, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
, pp. 2-2
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
23
-
-
41949111662
-
Using cartoons to teach Internet security
-
S. Srikwan and M. Jakobsson. Using cartoons to teach Internet security. Cryptologia, 32(2):137-154, 2008.
-
(2008)
Cryptologia
, vol.32
, Issue.2
, pp. 137-154
-
-
Srikwan, S.1
Jakobsson, M.2
-
24
-
-
79952291854
-
Understanding scam victims: Seven principles for systems security
-
Mar.
-
F. Stajano and P. Wilson. Understanding scam victims: seven principles for systems security. Commun. ACM, 54:70-75, Mar. 2011.
-
(2011)
Commun. ACM
, vol.54
, pp. 70-75
-
-
Stajano, F.1
Wilson, P.2
-
25
-
-
79951633637
-
Folk models of home computer security
-
New York, NY, USA, ACM
-
R. Wash. Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pages 11:1-11:16, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10
-
-
Wash, R.1
-
26
-
-
32244434492
-
Gathering evidence: Use of visual security cues in web browsers
-
School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, Canadian Human-Computer Communications Society
-
T. Whalen and K. M. Inkpen. Gathering evidence: use of visual security cues in web browsers. In Proceedings of Graphics Interface 2005, GI '05, pages 137-144, School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, 2005. Canadian Human-Computer Communications Society.
-
(2005)
Proceedings of Graphics Interface 2005, GI '05
, pp. 137-144
-
-
Whalen, T.1
Inkpen, K.M.2
-
28
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI conference on Human Factors in computing systems, CHI '06, pages 601-610, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '06
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
29
-
-
34250786200
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and G. Little. Web wallet: preventing phishing attacks by revealing user intentions. In Proceedings of the second symposium on Usable privacy and security, SOUPS '06, pages 102-113, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS '06
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
|