|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 51 occurrences of 37 keywords
|
|
|
Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
158 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 58-71, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
86 | Ye Cao, Weili Han, Yueran Le |
Anti-phishing based on automated individual white-list. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 51-60, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing |
63 | Sophie Gastellier-Prevost |
Vers une détection des attaques de phishing et pharming côté client. (Defeating phishing and pharming attacks at the client-side). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
57 | Baber Aslam, Lei Wu, Cliff Changchun Zou |
PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, NCA 2010, July 15-17, 2010, Cambridge, Massachusetts, USA, pp. 198-203, 2010, IEEE Computer Society, 978-1-4244-7628-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
design, usability, Phishing, web security, password authentication, Pharming |
52 | Sid Stamm, Zulfikar Ramzan, Markus Jakobsson |
Drive-By Pharming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 495-506, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings, pp. 50-61, 2009, Springer, 978-3-642-03963-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
46 | Ari Juels, Markus Jakobsson, Tom N. Jagatic |
Cache Cookies for Browser Authentication (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 301-305, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cache cookies, privacy, personalization, malware, Web browser, phishing, pharming |
40 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb |
Pharewell to Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings, pp. 233-245, 2008, Springer, 978-3-540-89334-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 47-61, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim |
Method for Evaluating the Security Risk of a Website Against Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 21-31, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Pavel I. Sharikov, Audrey Krasov, Artem Gelf, Ernest Birikh |
A Technique for Detecting the Substitution of a Java-Module of an Information System Prone to Pharming with Using a Hidden Embedding of a Digital Watermark Resistant to Decompilation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUMT ![In: 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2021, Brno, Czech Republic, October 25-27, 2021, pp. 219-223, 2021, IEEE, 978-1-6654-0219-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Nicola J. Patron |
Engineering Plants for Farming and Pharming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALIFE ![In: 2019 Conference on Artificial Life, ALIFE 2019, online, July 29 - August 2, 2019, pp. 9, 2019, MIT Press. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Mark G. Weiner, Jennifer Boehne, Terese Kornet, Ross Koppel |
Collaborative Pharming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2017, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 4-8, 2017, 2017, AMIA. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
31 | Iksu Kim, Yongyun Cho |
Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 31(1), pp. 343-355, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
31 | Sophie Gastellier-Prevost, Maryline Laurent |
Defeating pharming attacks at the client-side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: 5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011, pp. 33-40, 2011, IEEE, 978-1-4577-0458-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Sophie Gastellier-Prevost, Gustavo Gonzalez Granadillo, Maryline Laurent |
A Dual Approach to Detect Pharming Attacks at the Client-Side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NTMS ![In: 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011, Paris, France, February 7-10, 2011, pp. 1-5, 2011, IEEE, 978-1-4244-8704-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Eluemuno R. Blyden, Ken Christiansen |
Poultry Pharming: Next-Generation Technologies for Egg-Based Biopharmaceutical Manufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GHTC ![In: IEEE Global Humanitarian Technology Conference, GHTC 2011, Seattle, WA, USA, October 30 - November 1, 2011, pp. 51-55, 2011, IEEE Computer Society, 978-1-61284-634-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Xinyuan Wang 0005, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera |
Voice pharming attack and the trust of VoIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008, pp. 24, 2008, ACM, 978-1-60558-241-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Manish Gupta |
Pharming Attack Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Ethics and Security ![In: Encyclopedia of Information Ethics and Security, pp. 520-526, 2007, IGI Global, 9781591409885. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
31 | Omer Mahmood |
Custom Plugin - A Solution to Phishing and Pharming Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2006 International Conference on Security & Management, SAM 2006, Las Vegas, Nevada, USA, June 26-29, 2006, pp. 32-37, 2006, CSREA Press, 1-60132-001-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
31 | Rae Carrington Schipke |
The Language of Phishing, Pharming, and Other Internet Fraud-Metaphorically Speaking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISTAS ![In: Disaster Preparedness and Recovery: IEEE International Symposium on Technology and Society, ISTAS 2006, Flushing, NY, USA, June 8-10, 2006, pp. 1-6, 2006, IEEE, 978-1-4244-0479-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Sebastian Gajek, Jörg Schwenk, Christoph Wegener |
SSL-VA-Authentifizierung als Schutz von Phishing und Pharming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg, pp. 6-17, 2006, GI, 3-88579-171-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
26 | Ahmed Obied, Reda Alhajj |
Fraudulent and malicious sites on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 30(2), pp. 112-120, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming |
26 | Guanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, Vamsi Paruchuri |
Combating Typo-Squatting for Safer Browsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009, pp. 31-36, 2009, IEEE Computer Society, 978-0-7695-3639-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Typosquatting, Phishing, Pharming |
26 | Collin Jackson, Adam Barth |
Forcehttps: protecting high-security web sites from network attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 525-534, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HTTPS, same-origin policy, eavesdropping, pharming |
26 | Juline E. Mills, Sookeun Byun |
Cybercrimes against Consumers: Could Biometric Technology Be the Solution? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(4), pp. 64-71, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cybertrust, phishing, cybercrime, pharming |
20 | Adonis P. H. Fung, K. W. Cheung 0003 |
SSLock: sustaining the trust on entities brought by SSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 204-213, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SSL trust management, domain naming convention, man-in-the-middle attacks |
20 | Masaru Takesue |
An HTTP Extension for Secure Transfer of Confidential Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 101-108, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Antonio San Martino, Xavier Perramon |
Defending E-Banking Services: Antiphishing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 93-98, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Steven Crites, Francis Hsu, Hao Chen 0003 |
OMash: enabling secure web mashups via object abstractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 99-108, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
object abstraction, communication, web, mashup, protection, browser, security model, same origin policy |
20 | Antonio San Martino, Xavier Perramon |
Securing Web Banking Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 314-315, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Zhi Guan, Long Zhang, Zhong Chen 0001, Xianghao Nan |
Pseudo-randomness Inside Web Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 267-278, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 88-103, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 120-127, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson |
Phoiling phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 749, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian |
Pvault: a client server system providing mobile access to personal data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 123-129, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
secure sharing, untrusted service provider model, security, database, cryptography, encryption, secure storage, mobile access |
Displaying result #1 - #36 of 36 (100 per page; Change: )
|
|