-
4
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
New York, NY, USA, ACM
-
R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In Proceedings of the 2005 symposium on Usable privacy and security, SOUPS '05, pages 77-88, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS '05
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
5
-
-
33745816410
-
Why phishing works
-
New York, NY, USA, ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI conference on Human Factors in computing systems, CHI '06, pages 581-590, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '06
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
7
-
-
57649166927
-
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
-
New York, NY, USA, ACM
-
S. Egelman, L. F. Cranor, and J. Hong. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI conference on Human factors in computing systems, CHI '08, pages 1065-1074, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
8
-
-
78649998785
-
An empirical study of privacy-violating information flows in JavaScript Web applications
-
ACM Press, Oct.
-
D. Jang, R. Jhala, S. Lerner, and H. Shacham. An empirical study of privacy-violating information flows in JavaScript Web applications. In Proceedings of CCS 2010, pages 270-83. ACM Press, Oct. 2010.
-
(2010)
Proceedings of CCS 2010
, pp. 270-283
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
11
-
-
84884994690
-
Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests
-
N. Nikiforakis, A. Makridakis, E. Athanasopoulos, and E. P. Markatos. Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests. In Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND), volume 30, pages 107-117, 2009.
-
(2009)
Proceedings of the 3rd European Conference on Computer Network Defense (EC2ND)
, vol.30
, pp. 107-117
-
-
Nikiforakis, N.1
Makridakis, A.2
Athanasopoulos, E.3
Markatos, E.P.4
-
21
-
-
80051955689
-
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
-
Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and C. Jackson. I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11, pages 147-161, 2011.
-
(2011)
Proceedings of the 2011 IEEE Symposium on Security and Privacy, SP '11
, pp. 147-161
-
-
Weinberg, Z.1
Chen, E.Y.2
Jayaraman, P.R.3
Jackson, C.4
-
22
-
-
77953070493
-
Detection of phishing webpages based on visual similarity
-
New York, NY, USA, ACM
-
L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng. Detection of phishing webpages based on visual similarity. In Special interest tracks and posters of the 14th international conference on World Wide Web, WWW '05, pages 1060-1061, New York, NY, USA, 2005. ACM.
-
(2005)
Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, WWW '05
, pp. 1060-1061
-
-
Wenyin, L.1
Huang, G.2
Xiaoyue, L.3
Min, Z.4
Deng, X.5
-
23
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the SIGCHI conference on Human Factors in computing systems, CHI '06, pages 601-610, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '06
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
24
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
New York, NY, USA, ACM
-
Y. Zhang, J. I. Hong, and L. F. Cranor. Cantina: a content-based approach to detecting phishing web sites. In Proceedings of the 16th international conference on World Wide Web, WWW '07, pages 639-648, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web, WWW '07
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
|