-
1
-
-
77954007030
-
Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions
-
ser. CHI '10. New York, NY, USA: ACM
-
S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, "Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions," in Proceedings of the 28th international conference on Human factors in computing systems, ser. CHI '10. New York, NY, USA: ACM, 2010, pp. 373-382.
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems
, pp. 373-382
-
-
Sheng, S.1
Holbrook, M.2
Kumaraguru, P.3
Cranor, L.F.4
Downs, J.5
-
2
-
-
84888340476
-
-
accessed December
-
B. Krebs, "HBGary Federal hacked by Anonymous," http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/, 2011, accessed December 2011.
-
(2011)
HBGary Federal Hacked by Anonymous
-
-
Krebs, B.1
-
4
-
-
85006397404
-
Large-scale automatic classification of phishing pages
-
C. Whittaker, B. Ryner, and M. Nazif, "Large-scale automatic classification of phishing pages," in NDSS '10, 2010.
-
(2010)
NDSS '10
-
-
Whittaker, C.1
Ryner, B.2
Nazif, M.3
-
5
-
-
51849126916
-
Modelling user-phishing interaction
-
may
-
X. Dong, J. Clark, and J. Jacob, "Modelling user-phishing interaction," in Human System Interactions, 2008 Conference on, may 2008, pp. 627-632.
-
(2008)
Human System Interactions, 2008 Conference on
, pp. 627-632
-
-
Dong, X.1
Clark, J.2
Jacob, J.3
-
6
-
-
55849085790
-
A phishing vulnerability analysis of web based systems
-
July
-
W. D. Yu, S. Nargundkar, and N. Tiruthani, "A phishing vulnerability analysis of web based systems," in Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008). Marrakech, Morocco: IEEE, July 2008, pp. 326-331.
-
(2008)
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008). Marrakech, Morocco: IEEE
, pp. 326-331
-
-
Yu, W.D.1
Nargundkar, S.2
Tiruthani, N.3
-
7
-
-
79959464543
-
-
Anti-Phishing Working Group (APWG) , , accessed
-
Anti-Phishing Working Group (APWG), "Phishing activity trends report - second half 2010," http://apwg.org/reports/apwg report h2 2010.pdf, 2010, accessed
-
(2010)
Phishing Activity Trends Report - Second Half 2010
-
-
-
8
-
-
80855127906
-
-
Anti-Phishing Working Group (APWG) , 2011, accessed December
-
Anti-Phishing Working Group (APWG), "Phishing activity trends report - first half 2011," http://apwg.org/reports/apwg trends report h1 2011.pdf, 2011, accessed December 2011.
-
(2011)
Phishing Activity Trends Report - First Half 2011
-
-
-
9
-
-
34548344520
-
-
Anti-Phishing Working Group (APWG) , 2011, accessed July
-
Anti-Phishing Working Group (APWG), "Phishing activity trends report - second half 2011," http://apwg.org/reports/apwg trends report h2 2011.pdf, 2011, accessed July 2012.
-
(2012)
Phishing Activity Trends Report - Second Half 2011
-
-
-
10
-
-
84888384359
-
-
2011, accessed December
-
B. Schneier, "Details of the RSA hack," http://www.schneier. com/blog/archives/2011/08/details of the.html, 2011, accessed December 2011.
-
(2011)
Details of the RSA Hack
-
-
Schneier, B.1
-
11
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
DOI 10.1145/1240624.1240760, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2007, CHI 2007
-
P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge, "Protecting people from phishing: the design and evaluation of an embedded training email system," in Proceedings of the SIGCHI conference on Human factors in computing systems, ser. CHI '07. New York, NY, USA: ACM, 2007, pp. 905-914. (Pubitemid 47581678)
-
(2007)
Conference on Human Factors in Computing Systems - Proceedings
, pp. 905-914
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nunge, E.6
-
12
-
-
77649328039
-
An anti-phishing approach that uses training intervention for phishing websites detection
-
DC, USA: IEEE Computer Society
-
A. Alnajim and M. Munro, "An anti-phishing approach that uses training intervention for phishing websites detection," in Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations. Washington, DC, USA: IEEE Computer Society, 2009, pp. 405-410.
-
(2009)
Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations. Washington
, pp. 405-410
-
-
Alnajim, A.1
Munro, M.2
-
14
-
-
84857483221
-
-
accessed March
-
G. Gaffney, "The myth of the stupid user," http://www. infodesign.com.au/articles/themythofthestupiduser, accessed March 2011.
-
(2011)
The Myth of the Stupid User
-
-
Gaffney, G.1
-
15
-
-
64549084442
-
Natural-language processing for intrusion detection
-
dec.
-
A. Stone, "Natural-language processing for intrusion detection," Computer, vol. 40, no. 12, pp. 103-105, dec. 2007.
-
(2007)
Computer
, vol.40
, Issue.12
, pp. 103-105
-
-
Stone, A.1
-
16
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
ser. eCrime '07. New York, NY, USA: ACM
-
S. Abu-Nimeh, D. Nappa, X. Wang, and S. Nair, "A comparison of machine learning techniques for phishing detection," in Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ser. eCrime '07. New York, NY, USA: ACM, 2007, pp. 60-69.
-
(2007)
Proceedings of the Anti-phishing Working Groups 2nd Annual ECrime Researchers Summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
17
-
-
60649094724
-
Anti-phishing in offense and defense
-
2008. ACSAC 2008. Annual, 8-12
-
C. Yue and H. Wang, "Anti-phishing in offense and defense," in Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 8-12 2008, pp. 345-354.
-
(2008)
Computer Security Applications Conference
, pp. 345-354
-
-
Yue, C.1
Wang, H.2
-
18
-
-
72449140001
-
Humboldt: A distributed phishing disruption system
-
P. Knickerbocker, D. Yu, and J. Li, "Humboldt: A distributed phishing disruption system," in eCrime Researchers Summit, 2009, pp. 1-12.
-
(2009)
ECrime Researchers Summit
, pp. 1-12
-
-
Knickerbocker, P.1
Yu, D.2
Li, J.3
-
20
-
-
77953906935
-
Behavioral response to phishing risk
-
ser. eCrime '07. New York, NY, USA: ACM
-
J. S. Downs, M. Holbrook, and L. F. Cranor, "Behavioral response to phishing risk," in Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, ser. eCrime '07. New York, NY, USA: ACM, 2007, pp. 37-44.
-
(2007)
Proceedings of the Anti-phishing Working Groups 2nd Annual ECrime Researchers Summit
, pp. 37-44
-
-
Downs, J.S.1
Holbrook, M.2
Cranor, L.F.3
-
21
-
-
70449573111
-
Countermeasure techniques for deceptive phishing attack
-
H. Huang, J. Tan, and L. Liu, "Countermeasure techniques for deceptive phishing attack," in International Conference on New Trends in Information and Service Science, 2009. NISS '09, 2009, pp. 636-641.
-
(2009)
International Conference on New Trends in Information and Service Science, 2009. NISS '09
, pp. 636-641
-
-
Huang, H.1
Tan, J.2
Liu, L.3
-
22
-
-
77953898602
-
Examining the impact of website take-down on phishing
-
New York, NY, USA: ACM
-
T. Moore and R. Clayton, "Examining the impact of website take-down on phishing," in eCrime '07: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit. New York, NY, USA: ACM, 2007, pp. 1-13.
-
(2007)
ECrime '07: Proceedings of the Anti-phishing Working Groups 2nd Annual ECrime Researchers Summit
, pp. 1-13
-
-
Moore, T.1
Clayton, R.2
-
23
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
ser. CHI '08. New York, NY, USA: ACM
-
S. Egelman, L. F. Cranor, and J. Hong, "You've been warned: an empirical study of the effectiveness of web browser phishing warnings," in Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, ser. CHI '08. New York, NY, USA: ACM, 2008, pp. 1065-1074.
-
(2008)
Proceeding of the Twenty-sixth Annual SIGCHI Conference on Human Factors in Computing Systems
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
24
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
M. Wu, R. C. Miller, and S. L. Garfinkel, "Do security toolbars actually prevent phishing attacks?" in Proceedings of the SIGCHI conference on Human Factors in computing systems, ser. CHI '06, New York, NY, USA, 2006, pp. 601-610. (Pubitemid 44032148)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
25
-
-
84904793179
-
An empirical analysis of phishing blacklists
-
ser. CEAS'09, Mountain view, CA, July
-
S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang, "An empirical analysis of phishing blacklists," in Proceedings of the 6th Conference in Email and Anti-Spam, ser. CEAS'09, Mountain view, CA, July 2009.
-
(2009)
Proceedings of the 6th Conference in Email and Anti-Spam
-
-
Sheng, S.1
Wardman, B.2
Warner, G.3
Cranor, L.F.4
Hong, J.5
Zhang, C.6
-
26
-
-
84863473237
-
-
accessed Oct
-
Google, "Google safe browsing API," http://code.google.com/ apis/safebrowsing/, accessed Oct 2011.
-
(2011)
Google Safe Browsing API
-
-
-
27
-
-
84888336871
-
-
accessed Oct
-
Google, "Protocolv2Spec," http://code.google.com/p/google- safebrowsing/ wiki/Protocolv2Spec, accessed Oct 2011.
-
(2011)
Protocolv2Spec
-
-
-
28
-
-
77953329477
-
Phishnet: Predictive blacklisting to detect phishing attacks
-
NJ, USA: IEEE Press
-
P. Prakash, M. Kumar, R. R. Kompella, and M. Gupta, "Phishnet: predictive blacklisting to detect phishing attacks," in INFOCOM'10: Proceedings of the 29th conference on Information communications. Piscataway, NJ, USA: IEEE Press, 2010, pp. 346-350.
-
(2010)
INFOCOM'10: Proceedings of the 29th Conference on Information Communications. Piscataway
, pp. 346-350
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.R.3
Gupta, M.4
-
29
-
-
70349255573
-
Anti-phishing based on automated individual white-list
-
New York, NY, USA: ACM
-
Y. Cao, W. Han, and Y. Le, "Anti-phishing based on automated individual white-list," in DIM '08: Proceedings of the 4th ACM workshop on Digital identity management. New York, NY, USA: ACM, 2008, pp. 51-60.
-
(2008)
DIM '08: Proceedings of the 4th ACM Workshop on Digital Identity Management
, pp. 51-60
-
-
Cao, Y.1
Han, W.2
Le, Y.3
-
30
-
-
85044841595
-
Client-side defense against web-based identity theft
-
N. Chou, R. Ledesma, Y. Teraguchi, and J. C. Mitchell, "Client-side defense against web-based identity theft," in NDSS. The Internet Society, 2004.
-
(2004)
NDSS. The Internet Society
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Mitchell, J.C.4
-
31
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, "Measuring and Detecting Fast-Flux Service Networks," in Proceedings of the Network and Distributed System Security Symposium (NDSS), 2008.
-
(2008)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
32
-
-
62449094173
-
Phishguard: A browser plug-in for protection from phishing
-
P. Likarish, D. Dunbar, and T. E. Hansen, "Phishguard: A browser plug-in for protection from phishing," in 2nd International Conference on Internet Multimedia Services Architecture and Applications, 2008. IMSAA 2008, 2008, pp. 1-6.
-
(2008)
2nd International Conference on Internet Multimedia Services Architecture and Applications, 2008. IMSAA 2008
, pp. 1-6
-
-
Likarish, P.1
Dunbar, D.2
Hansen, T.E.3
-
33
-
-
54249120074
-
Phishwish: A stateless phishing filter using minimal rules
-
G. Tsudik, Ed. Berlin, Heidelberg: Springer-Verlag
-
D. L. Cook, V. K. Gurbani, and M. Daniluk, "Phishwish: A stateless phishing filter using minimal rules," in Financial Cryptography and Data Security, G. Tsudik, Ed. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 182-186.
-
(2008)
Financial Cryptography and Data Security
, pp. 182-186
-
-
Cook, D.L.1
Gurbani, V.K.2
Daniluk, M.3
-
34
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
DOI 10.1145/1242572.1242659, 16th International World Wide Web Conference, WWW2007
-
Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: a content-based approach to detecting phishing web sites," in Proceedings of the 16th international conference on World Wide Web, ser. WWW '07. New York, NY, USA: ACM, 2007, pp. 639-648. (Pubitemid 47582293)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
-
35
-
-
2442493808
-
Robust hyperlinks and locations
-
Jul.
-
T. A. Phelps and R. Wilensky, "Robust Hyperlinks and Locations," DLib Magazine, vol. 6, no. 7/8, Jul. 2000.
-
(2000)
DLib Magazine
, vol.6
, Issue.7-8
-
-
Phelps, T.A.1
Wilensky, R.2
-
36
-
-
50049105061
-
A phishing sites blacklist generator
-
ser. AICCSA '08. Washington, DC, USA: IEEE Computer Society
-
M. Sharifi and S. H. Siadati, "A phishing sites blacklist generator," in Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications, ser. AICCSA '08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 840-843.
-
(2008)
Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications
, pp. 840-843
-
-
Sharifi, M.1
Siadati, S.H.2
-
37
-
-
67349178856
-
Fighting phishing with discriminative keypoint features
-
may-june
-
K.-T. Chen, J.-Y. Chen, C.-R. Huang, and C.-S. Chen, "Fighting phishing with discriminative keypoint features," Internet Computing, IEEE, vol. 13, no. 3, pp. 56-63, may-june 2009.
-
(2009)
Internet Computing, IEEE
, vol.13
, Issue.3
, pp. 56-63
-
-
Chen, K.-T.1
Chen, J.-Y.2
Huang, C.-R.3
Chen, C.-S.4
-
38
-
-
45549085533
-
Contrast context histograman efficient discriminating local descriptor for object recognition and image matching
-
October
-
C.-R. Huang, C.-S. Chen, and P.-C. Chung, "Contrast context histograman efficient discriminating local descriptor for object recognition and image matching," Pattern Recogn., vol. 41, pp. 3071-3077, October 2008.
-
(2008)
Pattern Recogn.
, vol.41
, pp. 3071-3077
-
-
Huang, C.-R.1
Chen, C.-S.2
Chung, P.-C.3
-
39
-
-
67650466366
-
Visual similarity-based phishing detection without victim site information
-
M. Hara, A. Yamada, and Y. Miyake, "Visual similarity-based phishing detection without victim site information," in IEEE Symposium on Computational Intelligence in Cyber Security, 2009. CICS '09, 2009, pp. 30-36.
-
(2009)
IEEE Symposium on Computational Intelligence in Cyber Security, 2009. CICS '09
, pp. 30-36
-
-
Hara, M.1
Yamada, A.2
Miyake, Y.3
-
40
-
-
78149484030
-
Automatic detection of phishing target from phishing webpage
-
aug.
-
G. Liu, B. Qiu, and L. Wenyin, "Automatic detection of phishing target from phishing webpage," in Pattern Recognition (ICPR), 2010 20th International Conference on, aug. 2010, pp. 4153-4156.
-
(2010)
Pattern Recognition (ICPR), 2010 20th International Conference on
, pp. 4153-4156
-
-
Liu, G.1
Qiu, B.2
Wenyin, L.3
-
41
-
-
80053293428
-
Detecting dns-poisoning-based phishing attacks from their network performance characteristics
-
H. Kim and J. Huh, "Detecting dns-poisoning-based phishing attacks from their network performance characteristics," Electronics Letters, vol. 47, no. 11, pp. 656-658, 26 2011.
-
(2011)
Electronics Letters
, vol.47
, Issue.11
, pp. 656-658
-
-
Kim, H.1
Huh, J.2
-
42
-
-
80053634991
-
Textual and visual contentbased anti-phishing: A bayesian approach
-
oct.
-
H. Zhang, G. Liu, T. Chow, and W. Liu, "Textual and visual contentbased anti-phishing: A bayesian approach," IEEE Transactions on Neural Networks, vol. 22, no. 10, pp. 1532-1546, oct. 2011.
-
(2011)
IEEE Transactions on Neural Networks
, vol.22
, Issue.10
, pp. 1532-1546
-
-
Zhang, H.1
Liu, G.2
Chow, T.3
Liu, W.4
-
43
-
-
33751538239
-
Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD)
-
DOI 10.1109/TDSC.2006.50
-
A. Y. Fu, L. Wenyin, and X. Deng, "Detecting phishing web pages with visual similarity assessment based on earth mover's distance (emd)," IEEE Trans. Dependable Secur. Comput., vol. 3, no. 4, pp. 301-311, Oct. 2006. (Pubitemid 44837033)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 301-311
-
-
Fu, A.Y.1
Liu, W.2
Deng, X.3
-
44
-
-
72849117349
-
Detecting phishing emails using hybrid features
-
ser. UIC-ATC '09. Washington, DC, USA: IEEE Computer Society
-
L. Ma, B. Ofoghi, P. Watters, and S. Brown, "Detecting phishing emails using hybrid features," in Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, ser. UIC-ATC '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 493-497.
-
(2009)
Proceedings of the 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
, pp. 493-497
-
-
Ma, L.1
Ofoghi, B.2
Watters, P.3
Brown, S.4
-
45
-
-
51249089888
-
B-apt: Bayesian anti-phishing toolbar
-
P. Likarish, D. Dunbar, and T. E. Hansen, "B-apt: Bayesian anti-phishing toolbar," in IEEE International Conference on Communications, 2008. ICC '08, 2008, pp. 1745-1749.
-
(2008)
IEEE International Conference on Communications, 2008. ICC '08
, pp. 1745-1749
-
-
Likarish, P.1
Dunbar, D.2
Hansen, T.E.3
-
46
-
-
71749098791
-
New filtering approaches for phishing email
-
January
-
A. Bergholz, J. De Beer, S. Glahn, M.-F. Moens, G. Paaß, and S. Strobel, "New filtering approaches for phishing email," J. Comput. Secur., vol. 18, pp. 7-35, January 2010.
-
(2010)
J. Comput. Secur.
, vol.18
, pp. 7-35
-
-
Bergholz, A.1
De Beer, J.2
Glahn, S.3
Moens, M.-F.4
Paaß, G.5
Strobel, S.6
-
47
-
-
72449135688
-
Phishing detection using classifier ensembles
-
2009. eCRIME '09., 20 2009-oct. 21
-
F. Toolan and J. Carthy, "Phishing detection using classifier ensembles," in eCrime Researchers Summit, 2009. eCRIME '09., 20 2009-oct. 21 2009, pp. 1-9.
-
(2009)
ECrime Researchers Summit
, pp. 1-9
-
-
Toolan, F.1
Carthy, J.2
-
50
-
-
84888375986
-
-
accessed March
-
"Avoiding getting hooked by phishers," http://www.fraud.org/ tips/internet/phishing.htm, accessed March 2011.
-
(2011)
Avoiding Getting Hooked by Phishers
-
-
-
51
-
-
36849073159
-
Anti-Phishing Phil: The design and evaluation of a game that teaches people not to fall for phish
-
DOI 10.1145/1280680.1280692, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security
-
S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge, "Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish," in Proceedings of the 3rd symposium on Usable privacy and security, ser. SOUPS '07. New York, NY, USA: ACM, 2007, pp. 88-99. (Pubitemid 350229382)
-
(2007)
ACM International Conference Proceeding Series
, vol.229
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
52
-
-
51149084743
-
A self-healing, self-protecting collaborative intrusion detection architecture to traceback fast-flux phishing domains
-
C. V. Zhou, C. Leckie, S. Karunasekera, and T. Peng, "A self-healing, self-protecting collaborative intrusion detection architecture to traceback fast-flux phishing domains," in NOMS Workshops 2008. IEEE Network Operations and Management Symposium Workshops, 2008, 2008, pp. 321-327.
-
(2008)
NOMS Workshops 2008. IEEE Network Operations and Management Symposium Workshops, 2008
, pp. 321-327
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
Peng, T.4
-
53
-
-
84888385158
-
-
2006, accessed Oct
-
L. Cranor, S. Egelman, J. Hong, and Y. Zhang, "Phinding phish: An evaluation of anti-phishing toolbars," www.cylab.cmu.edu/files/ cmucylab06018.pdf, 2006, accessed Oct 2011.
-
(2011)
Phinding Phish: An Evaluation of Anti-phishing Toolbars
-
-
Cranor, L.1
Egelman, S.2
Hong, J.3
Zhang, Y.4
-
54
-
-
70449624176
-
Phishcatch-A phishing detection tool
-
W. D. Yu, S. Nargundkar, and N. Tiruthani, "Phishcatch-a phishing detection tool," in 33rd Annual IEEE International on Computer Software and Applications Conference, 2009. COMPSAC '09, 2009, pp. 451-456.
-
(2009)
33rd Annual IEEE International on Computer Software and Applications Conference, 2009. COMPSAC '09
, pp. 451-456
-
-
Yu, W.D.1
Nargundkar, S.2
Tiruthani, N.3
|