-
1
-
-
84872876337
-
-
Alexa.com
-
Alexa.com. "Alexa ranking methodology". http: //www.alexa.com/help/traffic_learn_more/
-
Alexa ranking methodology
-
-
-
3
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker, "Spamscatter: Characterizing internet scam hosting infrastructure," in USENIX Security Symposium, pp. 1-14, 2007.
-
(2007)
USENIX Security Symposium
, pp. 1-14
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
5
-
-
34548344520
-
-
Anti Phishing Working Group
-
Anti Phishing Working Group, Phishing Activity Trends Report - April 2007. http://www.antiphishing.org/reports/apwg_ report_april_2007.pdf
-
Phishing Activity Trends Report -April 2007
-
-
-
6
-
-
51349138904
-
Cyber-Fraud is One Typo Away
-
A. Banerjee, D. Barman, M. Faloutsos, and L. N. Bhuyan, "Cyber-Fraud is One Typo Away," in INFOCOM 2008, pp. 1939-1947, 2008.
-
(2008)
INFOCOM 2008
, pp. 1939-1947
-
-
Banerjee, A.1
Barman, D.2
Faloutsos, M.3
Bhuyan, L.N.4
-
7
-
-
0030211964
-
Bagging predictors
-
L. Breiman, "Bagging predictors," Machine Learning, vol. 24, no. 2, pp. 123-140, 1996.
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
8
-
-
0035478854
-
Random Forests
-
L. Breiman, "Random Forests," Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
9
-
-
84872874639
-
-
Internet X.509 Public Key Infrastructure Certificate and CRL Profile, (IETF RFC5280)
-
D. Cooper and et al, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, (IETF RFC5280). http://www.ietf.org/rfc/rfc5280. txt
-
-
-
Cooper, D.1
-
11
-
-
75749120777
-
McAUnintended adventures in browsing
-
B. Edelman, "McAUnintended adventures in browsing," Mcafee Security Journal, 2008. http: //www.mcafee.com/us/local_content/misc/threat_center/msj_unintended_adve ntures_ browsing.pdf
-
(2008)
Mcafee Security Journal
-
-
Edelman, B.1
-
12
-
-
57649166927
-
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
-
S. Egelman, L. F. Cranor, and J. Hong, "You've been warned: an empirical study of the effectiveness of web browser phishing warnings," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065-1074, 2008.
-
(2008)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
13
-
-
84872839988
-
-
Electronic Frontier Foundation
-
Electronic Frontier Foundation, HTTPS Everywhere, 2010. https://www.eff.org/https-everywhere
-
(2010)
HTTPS Everywhere
-
-
-
14
-
-
84872867570
-
-
F-Secure, Googkle.com Installed Malware by Exploiting Browser Vulnerabilities
-
F-Secure, Googkle.com Installed Malware by Exploiting Browser Vulnerabilities, 2009. http://www. f-secure.com/v-descs/googkle.shtml
-
(2009)
-
-
-
15
-
-
35348913799
-
Learning to Detect Phishing Emails
-
I. Fette, N. Sadeh, and A. Tomasic, "Learning to Detect Phishing Emails," in Proceedings of the 16th international conference on World Wide Web, pp. 649-656, 2007.
-
(2007)
Proceedings of the 16th international conference on World Wide Web
, pp. 649-656
-
-
Fette, I.1
Sadeh, N.2
Tomasic, A.3
-
16
-
-
84983110889
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Y. Freund and R. E. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting," in European Conference on Computational Learning Theory, pp. 23-37, 1995.
-
(1995)
European Conference on Computational Learning Theory
, pp. 23-37
-
-
Freund, Y.1
Schapire, R.E.2
-
17
-
-
84872868749
-
-
Google.com, Parked Domain Site
-
Google.com, Parked Domain Site. http: //adwords.google.com/support/aw/bin/answer. py?hl=en&answer=50002.
-
-
-
-
18
-
-
84872871046
-
-
Google.com, The Google Spell Checker
-
Google.com, The Google Spell Checker. http://www. google.co.uk/help/features.html.
-
-
-
-
19
-
-
42149186965
-
Cryptographic strength of SSL/TLS servers: Current and recent practices
-
H. Lee and T. Malkin and E. Nahum, "Cryptographic strength of SSL/TLS servers: Current and recent practices," in Internet Measurement Comference, pp. 83-92, 2007.
-
(2007)
Internet Measurement Comference
, pp. 83-92
-
-
Lee, H.1
Malkin, T.2
Nahum, E.3
-
22
-
-
84872873949
-
Text-base Transactions on the Web
-
artice 4
-
M. Almid ads-portal domains: Identification and measurements
-
(2010)
ACMshari and X. Yang, "Text-based ads-portal domains: Identification and measurements," ACM Transactions on the Web, vol. 4, no. 2, artice 4, 2010.
, vol.4
, Issue.2
-
-
Almishari, M.1
Yang, X.2
-
23
-
-
70350630557
-
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious URLs," in KDD 2009, pp. 1245-1254, 2009.
-
(2009)
KDD 2009
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
24
-
-
84870265063
-
Phishing secrets: History, effects, and countermeasures
-
A. S. Martino and X. Perramon, "Phishing secrets: History, effects, and countermeasures," International Journal of Network Security, vol. 11, no. 3, pp. 163-171, 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.3
, pp. 163-171
-
-
Martino, A.S.1
Perramon, X.2
-
25
-
-
84872836128
-
-
McAfee, McAfee SiteAdvisor
-
McAfee, McAfee SiteAdvisor. http://www.siteadvisor.com/.
-
-
-
-
30
-
-
84872831690
-
-
Netcraft, Netcraft SSL Survey
-
Netcraft, Netcraft SSL Survey, 2008. http://news. netcraft.com/SSL-Survey
-
(2008)
-
-
-
31
-
-
84872838143
-
-
OpenSSL, The OpenSSL Project
-
OpenSSL, The OpenSSL Project, 2007. http://www. openssl.org/.
-
(2007)
-
-
-
32
-
-
33750059168
-
Phoolproof phishing prevention
-
B. Parno, C. Kuo, and A. Perrig, "Phoolproof phishing prevention," in Proceedings of the 10th International Conference on Financial Cryptography and Data Security, pp. 1-19, 2006.
-
(2006)
Proceedings of the 10th International Conference on Financial Cryptography and Data Security
, pp. 1-19
-
-
Parno, B.1
Kuo, C.2
Perrig, A.3
-
33
-
-
84872853774
-
-
Phishtank.com
-
Phishtank.com. http://www.phishtank.com
-
-
-
-
35
-
-
0030370417
-
Bagging, boosting, and c4.5
-
AAAI Press
-
J. R. Quinlan, "Bagging, boosting, and c4.5," in 13th National Conference on Artificial Intelligence and 8th Innovative Applications of Artificial Intelligence Conference, pp. 725-730, AAAI Press, 1996.
-
(1996)
13th National Conference on Artificial Intelligence and 8th Innovative Applications of Artificial Intelligence Conference
, pp. 725-730
-
-
Quinlan, J.R.1
-
36
-
-
84872859486
-
-
Phishing Toolkit Attacks are Abusing SSL Certificates
-
Z. Raza, Phishing Toolkit Attacks are Abusing SSL Certificates, 2009. http: //www.symantec.com/connect/blogs/phishing-toolkit-attacks-are-abusing-ss l-certificates
-
(2009)
-
-
Raza, Z.1
-
37
-
-
84877725095
-
When private keys are public: Results from the 2008 debian openssl vulnerability
-
S. Yilek, E. Rescorla, H. Shacham, B. Enrigh, and S. Savage, "When private keys are public: Results from the 2008 debian openssl vulnerability," in Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference (IMC 2009), pp. 15-29, 2009.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference (IMC 2009)
, pp. 15-29
-
-
Yilek, S.1
Rescorla, E.2
Shacham, H.3
Enrigh, B.4
Savage, S.5
-
39
-
-
38049156019
-
Chosenprefix collisions for MD5 and colliding X. 509 certificates for different identities
-
M. Stevens, A. Lenstra, and B. D. Weger, "Chosenprefix collisions for MD5 and colliding X. 509 certificates for different identities," in Proceedings of the 26th Annual International Conference on Advances in Cryptology - Eurocrypt' 07, pp. 1-22, 2007.
-
(2007)
Proceedings of the 26th Annual International Conference on Advances in Cryptology - Eurocrypt' 07
, pp. 1-22
-
-
Stevens, M.1
Lenstra, A.2
Weger, B.D.3
-
40
-
-
70350346082
-
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
-
M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D. Osvik, and B. D. Weger, "Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate," in Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology - Crypto' 09, pp. 55-69, 2009.
-
(2009)
Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology - Crypto' 09
, pp. 55-69
-
-
Stevens, M.1
Sotirov, A.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.6
Weger, B.D.7
-
41
-
-
84872843211
-
-
Serial Typo-squatters Target Security Firms, Sep
-
W. Sturgeon, Serial Typo-squatters Target Security Firms, Sep. 2005. http://news.zdnet.com/2100-1009_22-5873001.html
-
(2005)
-
-
Sturgeon, W.1
-
43
-
-
84872866358
-
Generalized anomaly detection model for windowsbased malicious program behavior
-
Nov
-
X. Tang, C. N. Manikopoulos, and S. G. Ziavras, "Generalized anomaly detection model for windowsbased malicious program behavior," International Journal of Network Security, vol. 7, no. 3, pp. 428-435, Nov. 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 428-435
-
-
Tang, X.1
Manikopoulos, C.N.2
Ziavras, S.G.3
-
44
-
-
84872848267
-
-
VeriSign
-
VeriSign. http://www.verisign.com/.
-
-
-
-
45
-
-
84872857761
-
-
Network and Distributed System Security Symposium (NDSS2006)
-
Y. M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King, "Automated web patrol with strider honeymonkeys," in Network and Distributed System Security Symposium (NDSS2006), pp. 35-49, 2006.
-
(2006)
Automated web patrol with strider honeymonkeys
, pp. 35-49
-
-
Wang, Y.M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
46
-
-
84872831096
-
-
HTTP is Hazardous to Your Health
-
N. Weaver, HTTP is Hazardous to Your Health, 2008. http://nweaver.blogspot.com/2008/05/http-is-hazardous-to-your-health.htm l
-
(2008)
-
-
Weaver, N.1
-
47
-
-
84872851804
-
-
Http: Must die!
-
L. Weinstein, Http: Must die!. http://lauren. vortex.com/archive/000338.html
-
-
-
Weinstein, L.1
-
48
-
-
32244434492
-
Gathering evidence: use of visual security cues in web browsers
-
T. Whalen and K. M. Inkpen, "Gathering evidence: use of visual security cues in web browsers," in Proceedings of Graphics Interface 2005, pp. 137-144, 2005.
-
(2005)
Proceedings of Graphics Interface
, vol.2005
, pp. 137-144
-
-
Whalen, T.1
Inkpen, K.M.2
-
49
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI' 06), pp. 601- 610, 2006.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI' 06)
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
50
-
-
34250786200
-
Web wallet: Preventing phishing attacks by revealing user intentions
-
M. Wu, R. C. Miller, and G. Little, "Web wallet: Preventing phishing attacks by revealing user intentions," in Proceedings of the second symposium on Usable privacy and security (SOUPS' 06), pp. 102- 113, 2006.
-
(2006)
Proceedings of the second symposium on Usable privacy and security (SOUPS' 06)
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
51
-
-
79961032258
-
Strider typo-patrol: Discovery and analysis of systematic typo-squatting
-
July
-
Y. Wang, D. Beck, J. Wang, C. Verbowski, and B. Daniels, "Strider typo-patrol: Discovery and analysis of systematic typo-squatting," in Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI' 06), vol. 2, pp. 31-36, July 2006.
-
(2006)
Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI' 06)
, vol.2
, pp. 31-36
-
-
Wang, Y.1
Beck, D.2
Wang, J.3
Verbowski, C.4
Daniels, B.5
-
52
-
-
84872853995
-
-
Network and Distributed System Security Symposium (NDSS' 07)
-
Y. Zhang, S. Egelman, L. Cranor, and J. Hong, "Phinding phish: Evaluating anti-phishing tools," in Network and Distributed System Security Symposium (NDSS' 07), 2007
-
(2007)
Phinding phish: Evaluating anti-phishing tools
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
|