Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
75 | Guang Xiang, Jason I. Hong |
A hybrid phish detection approach by identity discovery and keywords retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 571-580, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, named entity recognition, anti-phishing |
47 | R. N. Karthika, C. Valliyammai, M. Naveena |
Phish Block: A Blockchain Framework for Phish Detection in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 44(1), pp. 777-795, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
47 | Bartlomiej Hanus, Yu Andy Wu, James Parrish |
Phish Me, Phish Me Not. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Inf. Syst. ![In: J. Comput. Inf. Syst. 62(3), pp. 516-526, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
47 | Fern Barrientos, Jody L. Jacobs, Shaneé Dawkins |
Scaling the Phish: Advancing the NIST Phish Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (38) ![In: HCI International 2021 - Posters - 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings, Part II, pp. 383-390, 2021, Springer, 978-3-030-78641-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Yunyi Zhang, Shuyuan Jin |
Hacks Hit the Phish: Phish Attack Detection Based on Hacks Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA (3) ![In: Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part III, pp. 299-309, 2021, Springer, 978-3-030-86136-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Karen Renaud, Gareth Renaud |
To phish, or not to phish... ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2017(10), pp. 20, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
47 | Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner |
Phish-Net: Investigating phish clusters using drop email addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-13, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Kai-Jie Chang, Chin-Chen Chang 0001 |
An e-mail signature protocol for anti-spam work-in-progress. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 70, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, spam, signature, phish, e-mail |
25 | Tyler Moore 0001, Richard Clayton 0001 |
Examining the impact of website take-down on phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 1-13, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
electronic crime, phishing, security economics |
25 | Rhiannon Weaver, M. Patrick Collins |
Fishing for phishes: applying capture-recapture methods to estimate phishing populations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 14-25, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Hugo da Silva Corrêa Pinto, Luis Otávio Alvares |
Extended Behavior Networks and Agent Personality: Investigating the Design of Character Stereotypes in the Game Unreal Tournament. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Intelligent Virtual Agents, 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005, Proceedings, pp. 418-429, 2005, Springer, 3-540-28738-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Robert D. Blumofe, Christopher F. Joerg, Bradley C. Kuszmaul, Charles E. Leiserson, Keith H. Randall, Yuli Zhou |
Cilk: An Efficient Multithreaded Runtime System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPoPP ![In: Proceedings of the Fifth ACM SIGPLAN Symposium on Principles & Practice of Parallel Programming (PPOPP), Santa Barbara, California, USA, July 19-21, 1995, pp. 207-216, 1995, ACM, 0-89791-700-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
24 | Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal |
Teach LLMs to Phish: Stealing Private Information from Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.00871, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Aditya Chandrasekar, Manogna Sreenivas, Soma Biswas |
PhISH-Net: Physics Inspired System for High Resolution Underwater Image Enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WACV ![In: IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2024, Waikoloa, HI, USA, January 3-8, 2024, pp. 1495-1505, 2024, IEEE, 979-8-3503-1892-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Pankaj Pandey, Nishchol Mishra |
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(4), pp. 881-891, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Lucas Torrealba Aravena, Pedro Casas, Javier Bustos-Jiménez, Germán Capdehourat, M. Findrik |
Phish Me If You Can - Lexicographic Analysis and Machine Learning for Phishing Websites Detection with PHISHWEB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 9th IEEE International Conference on Network Softwarization, NetSoft 2023, Madrid, Spain, June 19-23, 2023, pp. 252-256, 2023, IEEE, 979-8-3503-9980-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Megha Sharma, Kuldeep Singh 0005, Palvi Aggarwal, Varun Dutt |
How well does GPT phish people? An investigation involving cognitive biases and feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023, pp. 451-457, 2023, IEEE, 979-8-3503-2720-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuoer Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang 0001, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé |
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2566-2583, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Vielka Angela V. Adap, Gabriel A. Castillo, Erskine Jerrell M. Delos Reyes, Edward B. Ronquillo, Larry A. Vea |
Do Not Feed the Phish: Phishing Website Detection Using URL-based Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSSE ![In: The 5th World Symposium on Software Engineering, WSSE 2023, Tokyo, Japan, September 22-24, 2023, pp. 135-141, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Matt Dixon, James Nicholson, Dawn Branley-Bell, Pam Briggs, Lynne M. Coventry |
Holding Your Hand on the Danger Button: Observing User Phish Detection Strategies Across Mobile and Desktop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 6(MHCI), pp. 1-22, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Dawn M. Sarno, Mark B. Neider |
So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 64(8), pp. 1379-1403, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Jasmine E. McNealy |
Platforms as phish farms: Deceptive social engineering at scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 24(7), pp. 1677-1694, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Rizwan Ur Rahman, Lokesh Yadav, Deepak Singh Tomar |
Phish-Shelter: A Novel Anti-Phishing Browser Using Fused Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Technol. Res. ![In: J. Inf. Technol. Res. 15(1), pp. 1-23, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Holly Rosser, Maylene Mayor, Adam Stemmler, Vinod Kumar Ahuja, Andrea Grover, Matthew Hale |
Phish Finders: Crowd-powered RE for anti-phishing training tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE Workshops ![In: 30th IEEE International Requirements Engineering Conference Workshops, RE 2022 - Workshops, Melbourne, Australia, August 15-19, 2022, pp. 130-135, 2022, IEEE, 978-1-6654-6000-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Vincent Drury, Luisa Lux, Ulrike Meyer |
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pp. 14:1-14:11, 2022, ACM, 978-1-4503-9670-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Xu Lin 0003, Panagiotis Ilia, Saumya Solanki, Jason Polakis |
Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 1651-1668, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
24 | Vinod Kumar Ahuja, Holly K. Rosser, Andrea Grover, Matthew Hale |
Phish Finders: Improving Cybersecurity Training Tools Using Citizen Science. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 43rd International Conference on Information Systems, ICIS 2022, Digitization for the Next Generation, Copenhagen, Denmark, December 9-14, 2022, 2022, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
24 | Yuwei Sun, Ng S. T. Chong, Hideya Ochiai |
Federated Phish Bowl: LSTM-Based Decentralized Phishing Email Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022, Prague, Czech Republic, October 9-12, 2022, pp. 20-25, 2022, IEEE, 978-1-6654-5258-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Michael Koddebusch |
Exposing the Phish: The Effect of Persuasion Techniques in Phishing E-Mails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: dg.o 2022: The 23rd Annual International Conference on Digital Government Research, Virtual Event, Republic of Korea, June 15 - 17, 2022, pp. 78-87, 2022, ACM, 978-1-4503-9749-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder |
Better the Phish You Know: Evaluating Personalization in Anti-Phishing Learning Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEDU (2) ![In: Proceedings of the 14th International Conference on Computer Supported Education, CSEDU 2022, Online Streaming, April 22-24, 2022, Volume 2., pp. 458-466, 2022, SCITEPRESS, 978-989-758-562-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari |
Phish What You Wish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.03596, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer |
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.12343, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | A. V. Ramana, K. Lakshmanarao, Routhu Srinivasa Rao |
Stop-Phish: an intelligent phishing detection method using feature selection ensemble. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soc. Netw. Anal. Min. ![In: Soc. Netw. Anal. Min. 11(1), pp. 110, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Brian Kondracki, Babak Amin Azad, Oleksii Starov, Nick Nikiforakis |
Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pp. 36-50, 2021, ACM, 978-1-4503-8454-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray |
"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2021, Tempe, AZ, USA, October 4-6, 2021, pp. 227-235, 2021, IEEE, 978-1-6654-4496-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Pascal Gadient, Pascal Gerig, Oscar Nierstrasz, Mohammad Ghafari |
Phish What You Wish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QRS ![In: 21st IEEE International Conference on Software Quality, Reliability and Security, QRS 2021, Hainan, China, December 6-10, 2021, pp. 1048-1059, 2021, IEEE, 978-1-6654-5813-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer |
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021, pp. 59:1-59:12, 2021, ACM, 978-1-4503-9051-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter 0001, Alexander Benlian, Joachim Vogt 0002 |
SoK: Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS @ USENIX Security Symposium ![In: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021., pp. 339-358, 2021, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | Dawn M. Sarno, Joanna E. Lewis, Corey Bohil, Mark B. Neider |
Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 62(5), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Hiba Zuhair Zeydan, Ali Selamat |
Phish webpage classification using hybrid algorithm of machine learning and statistical induction ratios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Data Min. Model. Manag. ![In: Int. J. Data Min. Model. Manag. 12(3), pp. 255-276, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Michelle Steves, Kristen K. Greene, Mary Theofanos |
Categorizing human phishing difficulty: a Phish Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. ![In: J. Cybersecur. 6(1), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Sarah Al-Hussaini, Dena Al-Thani, Yin Yang 0001 |
Are They Likely to Complain on Phish or Spam? A Prediction Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BESC ![In: 7th International Conference on Behavioural and Social Computing, BESC 2020, Bournemouth, United Kingdom, November 5-7, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-8605-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Tobias Urban, Matteo Große-Kampmann, Dennis Tatang, Thorsten Holz, Norbert Pohlmann |
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II, pp. 272-291, 2020, Springer, 978-3-030-59012-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Adam Vincent |
Don't feed the phish: how to avoid phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2019(2), pp. 11-14, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | M. Satheesh Kumar, K. G. Srinivasagan 0001, Jalel Ben-Othman |
Sniff-Phish: A novel framework for resource intensive computation in cloud to detect email scam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 30(6), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse |
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1908.03640, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
24 | Firat Coskun Dalgic, Ahmet Selman Bozkir, Murat Aydos |
Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.07767, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
24 | Routhu Srinivasa Rao, Alwyn Roshan Pais |
Jail-Phish: An improved search engine based phishing detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 83, pp. 246-267, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Edona Fasllija, Hasan Ferit Eniser, Bernd Prünster |
Phish-Hook: Detecting Phishing Certificates Using Certificate Transparency Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (2) ![In: Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II, pp. 320-334, 2019, Springer, 978-3-030-37230-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse |
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers, pp. 219-233, 2019, Springer, 978-3-030-39302-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Hossein Shirazi, Kyle Haefner, Indrakshi Ray |
Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Multim. Data Eng. Manag. ![In: Int. J. Multim. Data Eng. Manag. 9(1), pp. 51-64, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Iain Embrey, Kim Kaivanto |
Many Phish in the C: A Coexisting-Choice-Criteria Model of Security Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1811.06414, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Yan Shoshitaishvili, Antonio Bianchi, Kevin Borgolte, Amat Cama, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, John Grosen, Paul Grosen, Aravind Machiry, Christopher Salls, Nick Stephens, Ruoyu Wang 0001, Giovanni Vigna |
Mechanical Phish: Resilient Autonomous Hacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 16(2), pp. 12-22, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky |
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1710.06064, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Gregory D. Moody, Dennis F. Galletta, Brian Kimball Dunn |
Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Inf. Syst. ![In: Eur. J. Inf. Syst. 26(6), pp. 564-584, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Ana Ferreira 0001, Rui Chilro |
What to Phish in a Subject? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography Workshops ![In: Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers, pp. 597-609, 2017, Springer, 978-3-319-70277-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky |
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HAISA ![In: Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings., pp. 41-51, 2017, University of Plymouth, 978-1-84102-428-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | James Nicholson, Lynne M. Coventry, Pam Briggs |
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017., pp. 285-298, 2017, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Hossein Shirazi, Kyle Haefner, Indrakshi Ray |
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: 2017 IEEE International Conference on Information Reuse and Integration, IRI 2017, San Diego, CA, USA, August 4-6, 2017, pp. 137-143, 2017, IEEE Computer Society, 978-1-5386-1562-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Melanie Volkamer, Karen Renaud, Paul Gerber |
Spot the phish by checking the pruned URL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 24(4), pp. 372-385, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Gaurav Varshney, Manoj Misra, Pradeep K. Atrey |
A phish detector using lightweight search features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 62, pp. 213-228, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Olga A. Zielinska, Allaire K. Welk, Christopher B. Mayhorn, Emerson R. Murphy-Hill |
The persuasive phish: examining the social psychological principles hidden in phishing emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotSoS ![In: Proceedings of the Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, USA, April 19-21, 2016, pp. 126, 2016, ACM, 978-1-4503-4277-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Samuel Marchal, Kalle Saari, Nidhi Singh 0001, N. Asokan |
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 36th IEEE International Conference on Distributed Computing Systems, ICDCS 2016, Nara, Japan, June 27-30, 2016, pp. 323-333, 2016, IEEE Computer Society, 978-1-5090-1483-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Samuel Marchal, Kalle Saari, Nidhi Singh 0001, N. Asokan |
Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1510.06501, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
24 | Rakesh M. Verma, Nirmala Rai |
Phish-IDetector: Message-Id Based Automatic Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 427-434, 2015, SciTePress, 978-989-758-117-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano |
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 197-215, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Hilarie Orman |
The Compleat Story of Phish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 17(1), pp. 87-91, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain |
Two-Pronged Phish Snagging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012, pp. 174-179, 2012, IEEE Computer Society, 978-1-4673-2244-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Mary B. Burns, Alexandra Durcikova, Jeffrey L. Jenkins |
On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems, ICIS 2012, Orlando, Florida, USA, December 16-19, 2012, 2012, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
24 | Hilarie Orman |
Towards a Semantics of Phish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy Workshops ![In: 2012 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012, pp. 91-96, 2012, IEEE Computer Society, 978-1-4673-2157-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Mark Blythe, Helen Petrie, John A. Clark |
F for fake: four studies on how we fall for phish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011, Vancouver, BC, Canada, May 7-12, 2011, pp. 3469-3478, 2011, ACM, 978-1-4503-0228-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Gregory D. Moody, Dennis F. Galletta, Jon Walker, Brian Kimball Dunn |
Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems, ICIS 2011, Shanghai, China, December 4-7, 2011, 2011, Association for Information Systems, 978-0-615-55907-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
24 | Michael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson |
PhorceField: a phish-proof password ceremony. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011, pp. 159-168, 2011, ACM, 978-1-4503-0672-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Tal Moran, Tyler Moore 0001 |
The Phish-Market Protocol: Secure Sharing Between Competitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(4), pp. 40-45, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Brad Wardman |
The Deadliest Catch: Reeling In Big Phish With a Deep MD5 Net. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Forensics Secur. Law ![In: J. Digit. Forensics Secur. Law 5(3), pp. 33-56, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Teaching Johnny not to fall for phish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 10(2), pp. 7:1-7:31, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Tal Moran, Tyler Moore 0001 |
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers, pp. 222-237, 2010, Springer, 978-3-642-14576-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs |
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 373-382, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
roleplay, survey, phishing, user behavior, social engineering, mechanical turk |
24 | Guang Xiang, Bryan A. Pendleton, Jason I. Hong, Carolyn P. Rosé |
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings, pp. 268-285, 2010, Springer, 978-3-642-15496-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham |
School of phish: a real-word evaluation of anti-phishing training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
embedded training, real-world studies, email, phishing, usable privacy and security |
24 | Marco Cova, Christopher Kruegel, Giovanni Vigna |
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 2nd USENIX Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings, 2008, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
24 | Hal Berghel, James Carpinter, Ju-Yeon Jo |
Phish Phactors: Offensive and Defensive Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Comput. ![In: Adv. Comput. 70, pp. 223-268, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang 0002 |
Phinding Phish: An Evaluation of Anti-Phishing Toolbars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2007, San Diego, California, USA, 28th February - 2nd March 2007, 2007, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
24 | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 88-99, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
development and testing, learning science, security user education, game design, phishing, interactive learning, usable privacy and security |
24 | John S. Quarterman |
PhishScope: Tracking Phish Server Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Forensic Pract. ![In: J. Digit. Forensic Pract. 1(2), pp. 103-114, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Mike Bond |
Phish and Chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers, pp. 49-51, 2006, Springer, 978-3-642-04903-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch, Ross J. Anderson, Ronald L. Rivest |
Phish and Chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers, pp. 40-48, 2006, Springer, 978-3-642-04903-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Stefan A. Robila, James W. Ragucci |
Don't be a phish: steps in user education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2006, Bologna, Italy, June 26-28, 2006, pp. 237-241, 2006, ACM, 1-59593-055-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
education, information security, phishing, computer education |
24 | Phil Cracknell |
Why 'Phish' when you can Trawl? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 10(4), pp. 236-239, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Steven A. Myers |
Helping the Phish Detect the Lure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 90, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Richard Clayton 0001 |
Who'd Phish from the Summit of Kilimanjaro?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 91-92, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Evangelos Moustakas, Penny Duquenoy, C. Ranganathan |
Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIW ![In: 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005, pp. 239-248, 2005, Academic Conferences Limited, Reading, UK. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | Rachna Dhamija, J. D. Tygar |
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIP ![In: Human Interactive Proofs, Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings, pp. 127-141, 2005, Springer, 3-540-26001-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Bradley J. Rhodes |
PHISH Nets: Planning Heuristically In Situated Hybrid Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agents ![In: Proceedings of the First International Conference on Autonomous Agents, AGENTS 1997, Marina del Rey, California, USA, February 5-8, 1997, pp. 480-481, 1997, ACM, 0-89791-877-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|