|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 428 occurrences of 209 keywords
|
|
|
Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
218 | Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad |
Phishing IQ Tests Measure Fear, Not Ability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 362-366, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
phishing education, phishing IQ test, phishing |
193 | Linfeng Li, Marko Helenius |
Usability evaluation of anti-phishing toolbars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(2), pp. 163-184, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
193 | André Bergholz |
AntiPhish: lessons learnt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 1-2, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
181 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
A phishing vulnerability analysis of web based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 326-331, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
165 | Troy Ronda, Stefan Saroiu, Alec Wolman |
Itrustpage: a user-assisted anti-phishing tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, pp. 261-272, 2008, ACM, 978-1-60558-013-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
phishing, anti-phishing |
134 | Rhiannon Weaver, M. Patrick Collins |
Fishing for phishes: applying capture-recapture methods to estimate phishing populations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 14-25, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
133 | Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel |
On the Effectiveness of Techniques to Detect Phishing Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 20-39, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
121 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
PhishCatch - A Phishing Detection Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 451-456, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
121 | Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen |
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 270-279, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
121 | Chuan Yue, Haining Wang |
Anti-Phishing in Offense and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 345-354, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
113 | Tyler Moore 0001, Richard Clayton 0001 |
Examining the impact of website take-down on phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 1-13, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
electronic crime, phishing, security economics |
113 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor |
Behavioral response to phishing risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 37-44, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
survey, phishing |
113 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 70-81, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security |
113 | R. Suriya, K. Saravanan, Arunkumar Thangavelu |
An integrated approach to detect phishing mail attacks: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 193-199, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code script checker, domain name checker, linkguard, phishing |
113 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 782-787, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
101 | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham |
School of phish: a real-word evaluation of anti-phishing training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
embedded training, real-world studies, email, phishing, usable privacy and security |
97 | Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade |
B-APT: Bayesian Anti-Phishing Toolbar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1745-1749, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
97 | Abdullah M. Alnajim, Malcolm Munro |
An evaluation of users' tips effectiveness for Phishing websites detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 63-68, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
97 | Dinei A. F. Florêncio, Cormac Herley |
Analysis and Improvement of Anti-Phishing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 148-157, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
93 | Yue Zhang 0002, Jason I. Hong, Lorrie Faith Cranor |
Cantina: a content-based approach to detecting phishing web sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 639-648, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
toolbar, evaluation, phishing, TF-IDF, anti-phishing |
89 | Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang 0001, Suku Nair |
A comparison of machine learning techniques for phishing detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 60-69, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
BART, NNet, machine learning, classification, SVM, logistic regression, phishing, random forests, CART |
89 | Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs |
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 373-382, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
roleplay, survey, phishing, user behavior, social engineering, mechanical turk |
89 | Ye Cao, Weili Han, Yueran Le |
Anti-phishing based on automated individual white-list. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 51-60, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing |
89 | Ian Fette, Norman M. Sadeh, Anthony Tomasic |
Learning to detect phishing emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 649-656, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
semantic attacks, learning, filtering, spam, email, phishing |
89 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 42, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
89 | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 88-99, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
development and testing, learning science, security user education, game design, phishing, interactive learning, usable privacy and security |
88 | Stefan A. Robila, James W. Ragucci |
Don't be a phish: steps in user education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2006, Bologna, Italy, June 26-28, 2006, pp. 237-241, 2006, ACM, 1-59593-055-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
education, information security, phishing, computer education |
85 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 352-355, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Bryan Parno, Cynthia Kuo, Adrian Perrig |
Phoolproof Phishing Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 1-19, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
85 | Ying Pan, Xuhua Ding |
Anomaly Based Web Phishing Page Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 381-392, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
85 | Rachna Dhamija, J. D. Tygar, Marti A. Hearst |
Why phishing works. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 581-590, 2006, ACM, 1-59593-372-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
phishing user study, why phishing works, phishing, security usability |
77 | Serge Egelman, Lorrie Faith Cranor, Jason I. Hong |
You've been warned: an empirical study of the effectiveness of web browser phishing warnings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008, pp. 1065-1074, 2008, ACM, 978-1-60558-011-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
warning messages, phishing, mental models, usable privacy and security |
77 | Anthony Y. Fu, Xiaotie Deng, Wenyin Liu |
A Potential IRI Based Phishing Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems Engineering - WISE 2005, 6th International Conference on Web Information Systems Engineering, New York, NY, USA, November 20-22, 2005, Proceedings, pp. 618-619, 2005, Springer, 3-540-30017-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Internationalized Resource Identifier (IRI), Internet security, Anti-phishing |
77 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Min Zhang, Xiaotie Deng |
Detection of phishing webpages based on visual similarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Special interest tracks and posters) ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005 - Special interest tracks and posters, pp. 1060-1061, 2005, ACM, 1-59593-051-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
web document analysis, information filtering, anti-phishing, visual similarity |
77 | Engin Kirda, Christopher Krügel |
Protecting Users Against Phishing Attacks with AntiPhish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 29th Annual International Computer Software and Applications Conference, COMPSAC 2005, Edinburgh, Scotland, UK, July 25-28, 2005. Volume 1, pp. 517-524, 2005, IEEE Computer Society, 0-7695-2413-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Phishing Attacks, User Protection, Security |
77 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Xiaotie Deng, Min Zhang |
Phishing Webpage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August - 1 September 2005, Seoul, Korea, pp. 560-564, 2005, IEEE Computer Society, 0-7695-2420-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web document analysis, Information filtering, Anti-Phishing |
73 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 256-272, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Wilfried N. Gansterer, David Pölz |
E-Mail Classification for Phishing Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIR ![In: Advances in Information Retrieval, 31th European Conference on IR Research, ECIR 2009, Toulouse, France, April 6-9, 2009. Proceedings, pp. 449-460, 2009, Springer, 978-3-642-00957-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim |
Method for Evaluating the Security Risk of a Website Against Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 21-31, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 254-258, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya |
PHONEY: Mimicking User Response to Detect Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings, pp. 668-672, 2006, IEEE Computer Society, 0-7695-2593-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Indranil Bose, Alvin Chung Man Leung |
Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(8), pp. 141-143, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
65 | Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa |
Online phishing classification using adversarial data mining and signaling games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 33-42, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering |
65 | Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Protecting people from phishing: the design and evaluation of an embedded training email system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 905-914, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
embedded training, email, phishing, situated learning, usable privacy and security |
65 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 68-80, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
65 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor |
Decision strategies and susceptibility to phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 79-90, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
phishing, mental models, qualitative methods |
65 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 32-41, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
64 | Guang Xiang, Jason I. Hong |
A hybrid phish detection approach by identity discovery and keywords retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 571-580, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, named entity recognition, anti-phishing |
61 | Giovane Cesar Moreira Moura, Aiko Pras |
Scalable Detection and Isolation of Phishing. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Scalability of Networks and Services, Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009, Enschede, The Netherlands, June 30-July 2, 2009. Proceedings, pp. 195-198, 2009, Springer, 978-3-642-02626-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung |
Detection of Phishing Attacks: A Machine Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Computing Applications in Industry ![In: Soft Computing Applications in Industry, pp. 373-383, 2008, Springer, 978-3-540-77464-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 47-61, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Mohsen Sharifi, Seyed Hossein Siadati |
A phishing sites blacklist generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 840-843, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth |
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 281-293, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Chik How Tan, Joseph Chee Ming Teo |
Protection AgainstWeb-based Password Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 754-759, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas |
An Intrusion Detection System for Detecting Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 181-192, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Anthony Y. Fu, Liu Wenyin, Xiaotie Deng |
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(4), pp. 301-311, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Antiphishing, visual assessment, Earth Mover's Distance |
61 | Min Wu 0005, Robert C. Miller, Greg Little |
Web wallet: preventing phishing attacks by revealing user intentions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 102-113, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user study, user interface design, world wide web and hypermedia |
61 | Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi |
SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Technologies for Advanced Heterogeneous Networks, First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005, Proceedings, pp. 195-209, 2005, Springer, 3-540-30884-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Abdullah M. Alnajim, Malcolm Munro |
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 405-410, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anti-Phishing countermeasures, online fraud, online banking security, Phishing, e-commerce security |
53 | Dinei A. F. Florêncio, Cormac Herley |
Evaluating a trial deployment of password re-use for phishing prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 26-36, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, access control, passwords, phishing |
53 | Debra L. Cook, Vijay K. Gurbani, Michael Daniluk |
Phishwish: A Stateless Phishing Filter Using Minimal Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 182-186, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
filters, email, phishing |
53 | Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim |
What Instills Trust? A Qualitative Study of Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 356-361, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
stimuli, design, authenticity, user interface design, experiment, email, phishing, psychology, web pages, think-aloud |
53 | Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim |
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 185-194, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Phishing, Social engineering, Security Mechanism |
53 | Markus Jakobsson, Jacob Ratkiewicz |
Designing ethical phishing experiments: a study of (ROT13) rOnl query features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 513-522, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, experiment, ethical, phishing, accurate |
53 | Charles Ohaya |
Managing phishing threats in an organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 159-161, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, phishing |
53 | Greg Goth |
Phishing Attacks Rising, But Dollar Losses Down. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 8, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
phishing attacks, zombie machines |
52 | Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone |
SC@CCO: a Graphic-Based Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 8-15, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password |
52 | Ben Adida |
Beamauth: two-factor web authentication with a bookmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 48-57, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
phishing, web security, two-factor authentication |
49 | HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song |
A New Anti-phishing Method in OpenID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 243-247, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bidgoli |
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, USA, pp. 311-314, 2007, IEEE Computer Society, 0-7695-3028-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Craig M. McRae, Rayford B. Vaughn |
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 270, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Min Wu 0005, Robert C. Miller, Simson L. Garfinkel |
Do security toolbars actually prevent phishing attacks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 601-610, 2006, ACM, 1-59593-372-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user study, user interface design, world wide web and hypermedia |
49 | Markus Jakobsson |
Modeling and Preventing Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 89, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Rachna Dhamija, J. D. Tygar |
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIP ![In: Human Interactive Proofs, Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings, pp. 127-141, 2005, Springer, 3-540-26001-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 120-127, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Nuttapong Sanglerdsinlapachai, Arnon Rungsawang |
Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 187-190, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
domain top-page, machine learning, semantic similarity, phishing, anti-phishing |
45 | Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi |
A Proactive Approach to Preventing Phishing Attacks Using Pshark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 915-921, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Phishing e-mail, whois database, Pshark, Anti-phishing |
41 | Viktor Krammer |
Phishing defense against IDN address spoofing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 32, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
usability, web browsers, phishing, internet security, unicode, internationalized domain names |
40 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGACT News ![In: SIGACT News 38(3), pp. 56-75, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
decisional, doppelganger, static diffie-hellman, user interfaces, phishing, oblivious transfer, password authenticated key exchange |
40 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 17-26, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
decisional & static diffie-hellman assumption, user interfaces, authentication, phishing, oblivious transfer, password authenticated key exchange |
40 | Wenyin Liu, Xiaotie Deng, Guanglin Huang, Anthony Y. Fu |
An Antiphishing Strategy Based on Visual Similarity Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(2), pp. 58-65, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security and Trust, Anti-Phishing, Visual Similarity |
40 | Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little |
The methodology and an application to fight against Unicode attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 91-101, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secure web identity, spam, phishing, Unicode |
37 | Rasha Zieni, Luisa Massari, Maria Carla Calzarossa |
Phishing or Not Phishing? A Survey on the Detection of Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 18499-18519, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
37 | Rubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001 |
How persuasive is a phishing email? A phishing game for phishing awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 27(6), pp. 581-612, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Mahmoud Khonji, Andrew Jones 0002, Youssef Iraqi |
A study of feature subset evaluators and feature subset searching methods for phishing classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEAS ![In: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings, pp. 135-144, 2011, ACM, 978-1-4503-0788-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Amir Herzberg |
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 13-24, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Hicham Tout, William Hafner |
Phishpin: An Identity-Based Anti-phishing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 347-352, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Tyler Moore 0001, Richard Clayton 0001 |
Evaluating the Wisdom of Crowds in Assessing Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 16-30, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb |
Pharewell to Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings, pp. 233-245, 2008, Springer, 978-3-540-89334-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Tjaart Steyn, Hennie A. Kruger, Lynette Drevin |
Identity Theft - Empirical evidence from a Phishing Exercise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 193-203, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
phising, education, Identity theft, security awareness |
37 | Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson |
Phoiling phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 749, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Ka-Ping Yee, Kragen Sitaker |
Passpet: convenient password management and phishing protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 32-43, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Richard Clayton |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 89-96, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Rachna Dhamija, J. Doug Tygar |
The battle against phishing: Dynamic Security Skins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 77-88, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Federico Maggi |
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 824-831, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
phone phishing, measurements, phishing, social engineering |
32 | Mariam Al-Hamar, Ray Dawson, Lin Guan |
A Culture of Trust Threatens Security and Privacy in Qatar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 991-995, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Spear phishing, Phishing, E-mail, Identity theft, Penetration test |
29 | Hossain Shahriar, Mohammad Zulkernine |
Information Source-Based Classification of Automatic Phishing Website Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 190-195, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Anti-phishing technique, information source |
29 | Qingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan 0001, Peng Cheng 0011, Charles Chen |
New Anti-phishing Method with Two Types of Passwords in OpenID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGEC ![In: Fifth International Conference on Genetic and Evolutionary Computing, ICGEC 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September 1, 2011, pp. 69-72, 2011, IEEE Computer Society, 978-1-4577-0817-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Two passwords, Single sign on (SSO), OpenID, Anti-phishing |
29 | Baber Aslam, Lei Wu, Cliff Changchun Zou |
PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, NCA 2010, July 15-17, 2010, Cambridge, Massachusetts, USA, pp. 198-203, 2010, IEEE Computer Society, 978-1-4244-7628-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
design, usability, Phishing, web security, password authentication, Pharming |
Displaying result #1 - #100 of 2033 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|