|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 428 occurrences of 209 keywords
|
|
|
Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
218 | Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad |
Phishing IQ Tests Measure Fear, Not Ability.  |
Financial Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
phishing education, phishing IQ test, phishing |
193 | Linfeng Li, Marko Helenius |
Usability evaluation of anti-phishing toolbars.  |
J. Comput. Virol.  |
2007 |
DBLP DOI BibTeX RDF |
|
193 | André Bergholz |
AntiPhish: lessons learnt.  |
KDD Workshop on CyberSecurity and Intelligence Informatics  |
2009 |
DBLP DOI BibTeX RDF |
|
181 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
A phishing vulnerability analysis of web based systems.  |
ISCC  |
2008 |
DBLP DOI BibTeX RDF |
|
165 | Troy Ronda, Stefan Saroiu, Alec Wolman |
Itrustpage: a user-assisted anti-phishing tool.  |
EuroSys  |
2008 |
DBLP DOI BibTeX RDF |
phishing, anti-phishing |
134 | Rhiannon Weaver, M. Patrick Collins |
Fishing for phishes: applying capture-recapture methods to estimate phishing populations.  |
eCrime Researchers Summit  |
2007 |
DBLP DOI BibTeX RDF |
|
133 | Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel |
On the Effectiveness of Techniques to Detect Phishing Sites.  |
DIMVA  |
2007 |
DBLP DOI BibTeX RDF |
|
121 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
PhishCatch - A Phishing Detection Tool.  |
COMPSAC (2)  |
2009 |
DBLP DOI BibTeX RDF |
|
121 | Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen |
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach.  |
ISA  |
2009 |
DBLP DOI BibTeX RDF |
|
121 | Chuan Yue, Haining Wang |
Anti-Phishing in Offense and Defense.  |
ACSAC  |
2008 |
DBLP DOI BibTeX RDF |
|
113 | Tyler Moore 0001, Richard Clayton 0001 |
Examining the impact of website take-down on phishing.  |
eCrime Researchers Summit  |
2007 |
DBLP DOI BibTeX RDF |
electronic crime, phishing, security economics |
113 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor |
Behavioral response to phishing risk.  |
eCrime Researchers Summit  |
2007 |
DBLP DOI BibTeX RDF |
survey, phishing |
113 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.  |
eCrime Researchers Summit  |
2007 |
DBLP DOI BibTeX RDF |
embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security |
113 | R. Suriya, K. Saravanan, Arunkumar Thangavelu |
An integrated approach to detect phishing mail attacks: a case study.  |
SIN  |
2009 |
DBLP DOI BibTeX RDF |
code script checker, domain name checker, linkguard, phishing |
113 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing.  |
ACIS-ICIS  |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
101 | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham |
School of phish: a real-word evaluation of anti-phishing training.  |
SOUPS  |
2009 |
DBLP DOI BibTeX RDF |
embedded training, real-world studies, email, phishing, usable privacy and security |
97 | Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade |
B-APT: Bayesian Anti-Phishing Toolbar.  |
ICC  |
2008 |
DBLP DOI BibTeX RDF |
|
97 | Abdullah M. Alnajim, Malcolm Munro |
An evaluation of users' tips effectiveness for Phishing websites detection.  |
ICDIM  |
2008 |
DBLP DOI BibTeX RDF |
|
97 | Dinei A. F. Florêncio, Cormac Herley |
Analysis and Improvement of Anti-Phishing Schemes.  |
SEC  |
2006 |
DBLP DOI BibTeX RDF |
|
93 | Yue Zhang 0002, Jason I. Hong, Lorrie Faith Cranor |
Cantina: a content-based approach to detecting phishing web sites.  |
WWW  |
2007 |
DBLP DOI BibTeX RDF |
toolbar, evaluation, phishing, TF-IDF, anti-phishing |
89 | Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang 0001, Suku Nair |
A comparison of machine learning techniques for phishing detection.  |
eCrime Researchers Summit  |
2007 |
DBLP DOI BibTeX RDF |
BART, NNet, machine learning, classification, SVM, logistic regression, phishing, random forests, CART |
89 | Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs |
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions.  |
CHI  |
2010 |
DBLP DOI BibTeX RDF |
roleplay, survey, phishing, user behavior, social engineering, mechanical turk |
89 | Ye Cao, Weili Han, Yueran Le |
Anti-phishing based on automated individual white-list.  |
Digital Identity Management  |
2008 |
DBLP DOI BibTeX RDF |
anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing |
89 | Ian Fette, Norman M. Sadeh, Anthony Tomasic |
Learning to detect phishing emails.  |
WWW  |
2007 |
DBLP DOI BibTeX RDF |
semantic attacks, learning, filtering, spam, email, phishing |
89 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions.  |
MobiMedia  |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
89 | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.  |
SOUPS  |
2007 |
DBLP DOI BibTeX RDF |
development and testing, learning science, security user education, game design, phishing, interactive learning, usable privacy and security |
88 | Stefan A. Robila, James W. Ragucci |
Don't be a phish: steps in user education.  |
ITiCSE  |
2006 |
DBLP DOI BibTeX RDF |
education, information security, phishing, computer education |
85 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack.  |
IAS  |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Bryan Parno, Cynthia Kuo, Adrian Perrig |
Phoolproof Phishing Prevention.  |
Financial Cryptography  |
2006 |
DBLP DOI BibTeX RDF |
|
85 | Ying Pan, Xuhua Ding |
Anomaly Based Web Phishing Page Detection.  |
ACSAC  |
2006 |
DBLP DOI BibTeX RDF |
|
85 | Rachna Dhamija, J. D. Tygar, Marti A. Hearst |
Why phishing works.  |
CHI  |
2006 |
DBLP DOI BibTeX RDF |
phishing user study, why phishing works, phishing, security usability |
77 | Serge Egelman, Lorrie Faith Cranor, Jason I. Hong |
You've been warned: an empirical study of the effectiveness of web browser phishing warnings.  |
CHI  |
2008 |
DBLP DOI BibTeX RDF |
warning messages, phishing, mental models, usable privacy and security |
77 | Anthony Y. Fu, Xiaotie Deng, Wenyin Liu |
A Potential IRI Based Phishing Strategy.  |
WISE  |
2005 |
DBLP DOI BibTeX RDF |
Internationalized Resource Identifier (IRI), Internet security, Anti-phishing |
77 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Min Zhang, Xiaotie Deng |
Detection of phishing webpages based on visual similarity.  |
WWW (Special interest tracks and posters)  |
2005 |
DBLP DOI BibTeX RDF |
web document analysis, information filtering, anti-phishing, visual similarity |
77 | Engin Kirda, Christopher Krügel |
Protecting Users Against Phishing Attacks with AntiPhish.  |
COMPSAC (1)  |
2005 |
DBLP DOI BibTeX RDF |
Phishing Attacks, User Protection, Security |
77 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Xiaotie Deng, Min Zhang |
Phishing Webpage Detection.  |
ICDAR  |
2005 |
DBLP DOI BibTeX RDF |
Web document analysis, Information filtering, Anti-Phishing |
73 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing.  |
Financial Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Wilfried N. Gansterer, David Pölz |
E-Mail Classification for Phishing Defense.  |
ECIR  |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework.  |
IPDPS  |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim |
Method for Evaluating the Security Risk of a Website Against Phishing Attacks.  |
ISI Workshops  |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks.  |
ICISS  |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya |
PHONEY: Mimicking User Response to Detect Phishing Attacks.  |
WOWMOM  |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Indranil Bose, Alvin Chung Man Leung |
Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks?  |
Commun. ACM  |
2009 |
DBLP DOI BibTeX RDF |
|
65 | Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa |
Online phishing classification using adversarial data mining and signaling games.  |
KDD Workshop on CyberSecurity and Intelligence Informatics  |
2009 |
DBLP DOI BibTeX RDF |
adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering |
65 | Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Protecting people from phishing: the design and evaluation of an embedded training email system.  |
CHI  |
2007 |
DBLP DOI BibTeX RDF |
embedded training, email, phishing, situated learning, usable privacy and security |
65 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.  |
EuroPKI  |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
65 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor |
Decision strategies and susceptibility to phishing.  |
SOUPS  |
2006 |
DBLP DOI BibTeX RDF |
phishing, mental models, qualitative methods |
65 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing.  |
Communications and Multimedia Security  |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
64 | Guang Xiang, Jason I. Hong |
A hybrid phish detection approach by identity discovery and keywords retrieval.  |
WWW  |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, named entity recognition, anti-phishing |
61 | Giovane Cesar Moreira Moura, Aiko Pras |
Scalable Detection and Isolation of Phishing. (PDF / PS)  |
AIMS  |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung |
Detection of Phishing Attacks: A Machine Learning Approach.  |
Soft Computing Applications in Industry  |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.  |
SEC  |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Mohsen Sharifi, Seyed Hossein Siadati |
A phishing sites blacklist generator.  |
AICCSA  |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth |
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.  |
Financial Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Chik How Tan, Joseph Chee Ming Teo |
Protection AgainstWeb-based Password Phishing.  |
ITNG  |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas |
An Intrusion Detection System for Detecting Phishing Attacks.  |
Secure Data Management  |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Anthony Y. Fu, Liu Wenyin, Xiaotie Deng |
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD).  |
IEEE Trans. Dependable Secur. Comput.  |
2006 |
DBLP DOI BibTeX RDF |
Antiphishing, visual assessment, Earth Mover's Distance |
61 | Min Wu 0005, Robert C. Miller, Greg Little |
Web wallet: preventing phishing attacks by revealing user intentions.  |
SOUPS  |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user study, user interface design, world wide web and hypermedia |
61 | Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi |
SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks.  |
AINTEC  |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Abdullah M. Alnajim, Malcolm Munro |
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection.  |
ITNG  |
2009 |
DBLP DOI BibTeX RDF |
anti-Phishing countermeasures, online fraud, online banking security, Phishing, e-commerce security |
53 | Dinei A. F. Florêncio, Cormac Herley |
Evaluating a trial deployment of password re-use for phishing prevention.  |
eCrime Researchers Summit  |
2007 |
DBLP DOI BibTeX RDF |
authentication, access control, passwords, phishing |
53 | Debra L. Cook, Vijay K. Gurbani, Michael Daniluk |
Phishwish: A Stateless Phishing Filter Using Minimal Rules.  |
Financial Cryptography  |
2008 |
DBLP DOI BibTeX RDF |
filters, email, phishing |
53 | Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim |
What Instills Trust? A Qualitative Study of Phishing.  |
Financial Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
stimuli, design, authenticity, user interface design, experiment, email, phishing, psychology, web pages, think-aloud |
53 | Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim |
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique.  |
ICCSA (2)  |
2007 |
DBLP DOI BibTeX RDF |
Phishing, Social engineering, Security Mechanism |
53 | Markus Jakobsson, Jacob Ratkiewicz |
Designing ethical phishing experiments: a study of (ROT13) rOnl query features.  |
WWW  |
2006 |
DBLP DOI BibTeX RDF |
security, experiment, ethical, phishing, accurate |
53 | Charles Ohaya |
Managing phishing threats in an organization.  |
InfoSecCD  |
2006 |
DBLP DOI BibTeX RDF |
security, phishing |
53 | Greg Goth |
Phishing Attacks Rising, But Dollar Losses Down.  |
IEEE Secur. Priv.  |
2005 |
DBLP DOI BibTeX RDF |
phishing attacks, zombie machines |
52 | Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone |
SC@CCO: a Graphic-Based Authentication System.  |
EUROSEC  |
2008 |
DBLP DOI BibTeX RDF |
data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password |
52 | Ben Adida |
Beamauth: two-factor web authentication with a bookmark.  |
CCS  |
2007 |
DBLP DOI BibTeX RDF |
phishing, web security, two-factor authentication |
49 | HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song |
A New Anti-phishing Method in OpenID.  |
SECURWARE  |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bidgoli |
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods.  |
Web Intelligence/IAT Workshops  |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Craig M. McRae, Rayford B. Vaughn |
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks.  |
HICSS  |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Min Wu 0005, Robert C. Miller, Simson L. Garfinkel |
Do security toolbars actually prevent phishing attacks?  |
CHI  |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user study, user interface design, world wide web and hypermedia |
49 | Markus Jakobsson |
Modeling and Preventing Phishing Attacks.  |
Financial Cryptography  |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Rachna Dhamija, J. D. Tygar |
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks.  |
HIP  |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.  |
ARES  |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Nuttapong Sanglerdsinlapachai, Arnon Rungsawang |
Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection.  |
WKDD  |
2010 |
DBLP DOI BibTeX RDF |
domain top-page, machine learning, semantic similarity, phishing, anti-phishing |
45 | Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi |
A Proactive Approach to Preventing Phishing Attacks Using Pshark.  |
ITNG  |
2009 |
DBLP DOI BibTeX RDF |
Phishing e-mail, whois database, Pshark, Anti-phishing |
41 | Viktor Krammer |
Phishing defense against IDN address spoofing attacks.  |
PST  |
2006 |
DBLP DOI BibTeX RDF |
usability, web browsers, phishing, internet security, unicode, internationalized domain names |
40 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure.  |
SIGACT News  |
2007 |
DBLP DOI BibTeX RDF |
decisional, doppelganger, static diffie-hellman, user interfaces, phishing, oblivious transfer, password authenticated key exchange |
40 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure.  |
Digital Identity Management  |
2007 |
DBLP DOI BibTeX RDF |
decisional & static diffie-hellman assumption, user interfaces, authentication, phishing, oblivious transfer, password authenticated key exchange |
40 | Wenyin Liu, Xiaotie Deng, Guanglin Huang, Anthony Y. Fu |
An Antiphishing Strategy Based on Visual Similarity Assessment.  |
IEEE Internet Comput.  |
2006 |
DBLP DOI BibTeX RDF |
Security and Trust, Anti-Phishing, Visual Similarity |
40 | Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little |
The methodology and an application to fight against Unicode attacks.  |
SOUPS  |
2006 |
DBLP DOI BibTeX RDF |
secure web identity, spam, phishing, Unicode |
37 | Rasha Zieni, Luisa Massari, Maria Carla Calzarossa |
Phishing or Not Phishing? A Survey on the Detection of Phishing Websites.  |
IEEE Access  |
2023 |
DBLP DOI BibTeX RDF |
|
37 | Rubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001 |
How persuasive is a phishing email? A phishing game for phishing awareness.  |
J. Comput. Secur.  |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Mahmoud Khonji, Andrew Jones 0002, Youssef Iraqi |
A study of feature subset evaluators and feature subset searching methods for phishing classification.  |
CEAS  |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Amir Herzberg |
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.  |
SEC  |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Hicham Tout, William Hafner |
Phishpin: An Identity-Based Anti-phishing Approach.  |
CSE (3)  |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Tyler Moore 0001, Richard Clayton 0001 |
Evaluating the Wisdom of Crowds in Assessing Phishing Websites.  |
Financial Cryptography  |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb |
Pharewell to Phishing.  |
SSS  |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Tjaart Steyn, Hennie A. Kruger, Lynette Drevin |
Identity Theft - Empirical evidence from a Phishing Exercise.  |
SEC  |
2007 |
DBLP DOI BibTeX RDF |
phising, education, Identity theft, security awareness |
37 | Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson |
Phoiling phishing.  |
WWW  |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Ka-Ping Yee, Kragen Sitaker |
Passpet: convenient password management and phishing protection.  |
SOUPS  |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Richard Clayton |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).  |
Security Protocols Workshop  |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Rachna Dhamija, J. Doug Tygar |
The battle against phishing: Dynamic Security Skins.  |
SOUPS  |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Federico Maggi |
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds.  |
CIT  |
2010 |
DBLP DOI BibTeX RDF |
phone phishing, measurements, phishing, social engineering |
32 | Mariam Al-Hamar, Ray Dawson, Lin Guan |
A Culture of Trust Threatens Security and Privacy in Qatar.  |
CIT  |
2010 |
DBLP DOI BibTeX RDF |
Spear phishing, Phishing, E-mail, Identity theft, Penetration test |
29 | Hossain Shahriar, Mohammad Zulkernine |
Information Source-Based Classification of Automatic Phishing Website Detectors.  |
SAINT  |
2011 |
DBLP DOI BibTeX RDF |
Anti-phishing technique, information source |
29 | Qingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan 0001, Peng Cheng 0011, Charles Chen |
New Anti-phishing Method with Two Types of Passwords in OpenID System.  |
ICGEC  |
2011 |
DBLP DOI BibTeX RDF |
Two passwords, Single sign on (SSO), OpenID, Anti-phishing |
29 | Baber Aslam, Lei Wu, Cliff Changchun Zou |
PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks.  |
NCA  |
2010 |
DBLP DOI BibTeX RDF |
design, usability, Phishing, web security, password authentication, Pharming |
Displaying result #1 - #100 of 2033 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|