-
1
-
-
85093982798
-
-
Amazon
-
Amazon. http://www.amazon.com/phone/.
-
-
-
-
3
-
-
85093967722
-
-
Firefox Phishing Protection
-
Firefox Phishing Protection. http://www.mozilla.com/en-US/firefox/phishing-protection/.
-
-
-
-
5
-
-
84866240965
-
-
iPhone User's Guide. http://manuals.info.apple.com/en/iPhone_User_Guide.pdf.
-
iPhone User's Guide
-
-
-
6
-
-
84868899582
-
-
Microsoft Phishing Filter. http://www.microsoft.com/protect/products/ yourself/phishingfilter.mspx.
-
Microsoft Phishing Filter
-
-
-
8
-
-
85093947922
-
-
Spoofstick
-
Spoofstick. http://www.spoofstick.com/.
-
-
-
-
9
-
-
85093944688
-
-
Trustbar
-
Trustbar. http://trustbar.mozdev.org/.
-
-
-
-
11
-
-
85044841595
-
Client-side defense against web-based identity theft
-
(February)
-
CHOU, N., LEDESMA, R., TERAGUCHI, Y., BONEH, D., AND MITCHELL, J. C. Client-side defense against web-based identity theft. In NDSS'04: Proceedings of the 11th Annual Network and Distributed System Security Symposium (February 2004).
-
(2004)
NDSS'04: Proceedings of the 11th Annual Network and Distributed System Security Symposium
-
-
CHOU, N.1
LEDESMA, R.2
TERAGUCHI, Y.3
BONEH, D.4
MITCHELL, J. C.5
-
12
-
-
33745816410
-
Why phishing works
-
(New York, NY, USA), ACM Press
-
DHAMIJA, R., TYGAR, J. D., AND HEARST, M. Why phishing works. In CHI'06: Proceedings of the SIGCHI conference on Human Factors in computing systems (New York, NY, USA, 2006), ACM Press, pp. 581-590.
-
(2006)
CHI'06: Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 581-590
-
-
DHAMIJA, R.1
TYGAR, J. D.2
HEARST, M.3
-
13
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
(New York, NY, USA), ACM Press
-
EGELMAN, S., CRANOR, L. F., AND HONG, J. You've been warned: An empirical study of the effectiveness of web browser phishing warnings. In CHI'08: Proceedings of the SIGCHI conference on Human Factors in computing systems (New York, NY, USA, 2008), ACM Press.
-
(2008)
CHI'08: Proceedings of the SIGCHI conference on Human Factors in computing systems
-
-
EGELMAN, S.1
CRANOR, L. F.2
HONG, J.3
-
14
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
(New York, NY, USA), ACM
-
GARERA, S., PROVOS, N., CHEW, M., AND RUBIN, A. D. A framework for detection and measurement of phishing attacks. In WORM'07: Proceedings of the 2007 ACM workshop on Recurring malcode (New York, NY, USA, 2007), ACM, pp. 1-8.
-
(2007)
WORM'07: Proceedings of the 2007 ACM workshop on Recurring malcode
, pp. 1-8
-
-
GARERA, S.1
PROVOS, N.2
CHEW, M.3
RUBIN, A. D.4
-
15
-
-
26444453924
-
Modeling and preventing phishing attacks
-
JAKOBSSON, M. Modeling and preventing phishing attacks. In Financial Cryptography (2005), p. 89.
-
(2005)
Financial Cryptography
, pp. 89
-
-
JAKOBSSON, M.1
-
16
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
(New York, NY, USA), ACM Press
-
WU, M., MILLER, R. C., AND GARFINKEL, S. L. Do security toolbars actually prevent phishing attacks? In CHI'06: Proceedings of the SIGCHI conference on Human Factors in computing systems (New York, NY, USA, 2006), ACM Press, pp. 601-610.
-
(2006)
CHI'06: Proceedings of the SIGCHI conference on Human Factors in computing systems
, pp. 601-610
-
-
WU, M.1
MILLER, R. C.2
GARFINKEL, S. L.3
-
17
-
-
35348905575
-
Cantina: a content-based approach to detecting phishing web sites
-
(New York, NY, USA), ACM
-
ZHANG, Y., HONG, J. I., AND CRANOR, L. F. Cantina: a content-based approach to detecting phishing web sites. In WWW'07: Proceedings of the 16th international conference on World Wide Web (New York, NY, USA, 2007), ACM, pp. 639-648.
-
(2007)
WWW'07: Proceedings of the 16th international conference on World Wide Web
, pp. 639-648
-
-
ZHANG, Y.1
HONG, J. I.2
CRANOR, L. F.3
|