The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phishing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2005 (47) 2006 (67) 2007 (68) 2008 (76) 2009 (72) 2010 (55) 2011 (53) 2012 (45) 2013 (54) 2014 (68) 2015 (61) 2016 (90) 2017 (90) 2018 (105) 2019 (153) 2020 (192) 2021 (201) 2022 (235) 2023 (239) 2024 (62)
Publication types (Num. hits)
article(850) data(2) incollection(11) inproceedings(1144) phdthesis(25) proceedings(1)
Venues (Conferences, Journals, ...)
CoRR(175) IEEE Access(48) Comput. Secur.(44) eCrime(37) HICSS(19) CHI(18) Expert Syst. Appl.(18) CCS(17) WWW(17) Financial Cryptography(16) IEEE Secur. Priv.(16) ISI(16) HAISA(15) AMCIS(14) ARES(14) USENIX Security Symposium(14) More (+10 of total 795)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 428 occurrences of 209 keywords

Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
218Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad Phishing IQ Tests Measure Fear, Not Ability. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF phishing education, phishing IQ test, phishing
193Linfeng Li, Marko Helenius Usability evaluation of anti-phishing toolbars. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
193André Bergholz AntiPhish: lessons learnt. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
181Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani A phishing vulnerability analysis of web based systems. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
165Troy Ronda, Stefan Saroiu, Alec Wolman Itrustpage: a user-assisted anti-phishing tool. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF phishing, anti-phishing
134Rhiannon Weaver, M. Patrick Collins Fishing for phishes: applying capture-recapture methods to estimate phishing populations. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
133Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel On the Effectiveness of Techniques to Detect Phishing Sites. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
121Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani PhishCatch - A Phishing Detection Tool. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
121Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
121Chuan Yue, Haining Wang Anti-Phishing in Offense and Defense. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
113Tyler Moore 0001, Richard Clayton 0001 Examining the impact of website take-down on phishing. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electronic crime, phishing, security economics
113Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor Behavioral response to phishing risk. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF survey, phishing
113Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security
113R. Suriya, K. Saravanan, Arunkumar Thangavelu An integrated approach to detect phishing mail attacks: a case study. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code script checker, domain name checker, linkguard, phishing
113Qiong Ren, Yi Mu 0001, Willy Susilo SEFAP: An Email System for Anti-Phishing. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious Email, Digital Signature, Anti-Phishing
101Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham School of phish: a real-word evaluation of anti-phishing training. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF embedded training, real-world studies, email, phishing, usable privacy and security
97Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade B-APT: Bayesian Anti-Phishing Toolbar. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
97Abdullah M. Alnajim, Malcolm Munro An evaluation of users' tips effectiveness for Phishing websites detection. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
97Dinei A. F. Florêncio, Cormac Herley Analysis and Improvement of Anti-Phishing Schemes. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
93Yue Zhang 0002, Jason I. Hong, Lorrie Faith Cranor Cantina: a content-based approach to detecting phishing web sites. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF toolbar, evaluation, phishing, TF-IDF, anti-phishing
89Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang 0001, Suku Nair A comparison of machine learning techniques for phishing detection. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF BART, NNet, machine learning, classification, SVM, logistic regression, phishing, random forests, CART
89Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF roleplay, survey, phishing, user behavior, social engineering, mechanical turk
89Ye Cao, Weili Han, Yueran Le Anti-phishing based on automated individual white-list. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing
89Ian Fette, Norman M. Sadeh, Anthony Tomasic Learning to detect phishing emails. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semantic attacks, learning, filtering, spam, email, phishing
89Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh Phishing attacks and solutions. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP
89Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF development and testing, learning science, security user education, game design, phishing, interactive learning, usable privacy and security
88Stefan A. Robila, James W. Ragucci Don't be a phish: steps in user education. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF education, information security, phishing, computer education
85Huajun Huang, Shaohong Zhong, Junshan Tan Browser-Side Countermeasures for Deceptive Phishing Attack. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
85Bryan Parno, Cynthia Kuo, Adrian Perrig Phoolproof Phishing Prevention. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
85Ying Pan, Xuhua Ding Anomaly Based Web Phishing Page Detection. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
85Rachna Dhamija, J. D. Tygar, Marti A. Hearst Why phishing works. Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF phishing user study, why phishing works, phishing, security usability
77Serge Egelman, Lorrie Faith Cranor, Jason I. Hong You've been warned: an empirical study of the effectiveness of web browser phishing warnings. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF warning messages, phishing, mental models, usable privacy and security
77Anthony Y. Fu, Xiaotie Deng, Wenyin Liu A Potential IRI Based Phishing Strategy. Search on Bibsonomy WISE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Internationalized Resource Identifier (IRI), Internet security, Anti-phishing
77Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Min Zhang, Xiaotie Deng Detection of phishing webpages based on visual similarity. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF web document analysis, information filtering, anti-phishing, visual similarity
77Engin Kirda, Christopher Krügel Protecting Users Against Phishing Attacks with AntiPhish. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Phishing Attacks, User Protection, Security
77Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Xiaotie Deng, Min Zhang Phishing Webpage Detection. Search on Bibsonomy ICDAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web document analysis, Information filtering, Anti-Phishing
73Tyler Moore 0001, Richard Clayton 0001 Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Wilfried N. Gansterer, David Pölz E-Mail Classification for Phishing Defense. Search on Bibsonomy ECIR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
73Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim Method for Evaluating the Security Risk of a Website Against Phishing Attacks. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
73Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
73Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya PHONEY: Mimicking User Response to Detect Phishing Attacks. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
72Indranil Bose, Alvin Chung Man Leung Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks? Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
65Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa Online phishing classification using adversarial data mining and signaling games. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering
65Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge Protecting people from phishing: the design and evaluation of an embedded training email system. Search on Bibsonomy CHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded training, email, phishing, situated learning, usable privacy and security
65Willy Susilo, Yi Mu 0001 Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF repudiable, authentication, email, phishing, separable, ID-based, deniable
65Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor Decision strategies and susceptibility to phishing. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF phishing, mental models, qualitative methods
65Rolf Oppliger, Sebastian Gajek Effective Protection Against Phishing and Web Spoofing. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF visual spoofing, phishing, SSL/TLS, Web spoofing
64Guang Xiang, Jason I. Hong A hybrid phish detection approach by identity discovery and keywords retrieval. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information retrieval, named entity recognition, anti-phishing
61Giovane Cesar Moreira Moura, Aiko Pras Scalable Detection and Isolation of Phishing. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung Detection of Phishing Attacks: A Machine Learning Approach. Search on Bibsonomy Soft Computing Applications in Industry The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Yongdong Wu, Haixia Yao, Feng Bao 0001 Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Mohsen Sharifi, Seyed Hossein Siadati A phishing sites blacklist generator. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Chik How Tan, Joseph Chee Ming Teo Protection AgainstWeb-based Password Phishing. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas An Intrusion Detection System for Detecting Phishing Attacks. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Anthony Y. Fu, Liu Wenyin, Xiaotie Deng Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Antiphishing, visual assessment, Earth Mover's Distance
61Min Wu 0005, Robert C. Miller, Greg Little Web wallet: preventing phishing attacks by revealing user intentions. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-commerce, user study, user interface design, world wide web and hypermedia
61Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks. Search on Bibsonomy AINTEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
57Abdullah M. Alnajim, Malcolm Munro An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-Phishing countermeasures, online fraud, online banking security, Phishing, e-commerce security
53Dinei A. F. Florêncio, Cormac Herley Evaluating a trial deployment of password re-use for phishing prevention. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, access control, passwords, phishing
53Debra L. Cook, Vijay K. Gurbani, Michael Daniluk Phishwish: A Stateless Phishing Filter Using Minimal Rules. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF filters, email, phishing
53Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim What Instills Trust? A Qualitative Study of Phishing. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stimuli, design, authenticity, user interface design, experiment, email, phishing, psychology, web pages, think-aloud
53Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Phishing, Social engineering, Security Mechanism
53Markus Jakobsson, Jacob Ratkiewicz Designing ethical phishing experiments: a study of (ROT13) rOnl query features. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, experiment, ethical, phishing, accurate
53Charles Ohaya Managing phishing threats in an organization. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, phishing
53Greg Goth Phishing Attacks Rising, But Dollar Losses Down. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF phishing attacks, zombie machines
52Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone SC@CCO: a Graphic-Based Authentication System. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password
52Ben Adida Beamauth: two-factor web authentication with a bookmark. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF phishing, web security, two-factor authentication
49HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song A New Anti-phishing Method in OpenID. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bidgoli Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Craig M. McRae, Rayford B. Vaughn Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Min Wu 0005, Robert C. Miller, Simson L. Garfinkel Do security toolbars actually prevent phishing attacks? Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-commerce, user study, user interface design, world wide web and hypermedia
49Markus Jakobsson Modeling and Preventing Phishing Attacks. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Rachna Dhamija, J. D. Tygar Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. Search on Bibsonomy HIP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Nuttapong Sanglerdsinlapachai, Arnon Rungsawang Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF domain top-page, machine learning, semantic similarity, phishing, anti-phishing
45Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi A Proactive Approach to Preventing Phishing Attacks Using Pshark. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Phishing e-mail, whois database, Pshark, Anti-phishing
41Viktor Krammer Phishing defense against IDN address spoofing attacks. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF usability, web browsers, phishing, internet security, unicode, internationalized domain names
40Markus Jakobsson, Steven A. Myers Delayed password disclosure. Search on Bibsonomy SIGACT News The full citation details ... 2007 DBLP  DOI  BibTeX  RDF decisional, doppelganger, static diffie-hellman, user interfaces, phishing, oblivious transfer, password authenticated key exchange
40Markus Jakobsson, Steven A. Myers Delayed password disclosure. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF decisional & static diffie-hellman assumption, user interfaces, authentication, phishing, oblivious transfer, password authenticated key exchange
40Wenyin Liu, Xiaotie Deng, Guanglin Huang, Anthony Y. Fu An Antiphishing Strategy Based on Visual Similarity Assessment. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security and Trust, Anti-Phishing, Visual Similarity
40Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little The methodology and an application to fight against Unicode attacks. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure web identity, spam, phishing, Unicode
37Rasha Zieni, Luisa Massari, Maria Carla Calzarossa Phishing or Not Phishing? A Survey on the Detection of Phishing Websites. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
37Rubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001 How persuasive is a phishing email? A phishing game for phishing awareness. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Mahmoud Khonji, Andrew Jones 0002, Youssef Iraqi A study of feature subset evaluators and feature subset searching methods for phishing classification. Search on Bibsonomy CEAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
37Amir Herzberg Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Hicham Tout, William Hafner Phishpin: An Identity-Based Anti-phishing Approach. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Tyler Moore 0001, Richard Clayton 0001 Evaluating the Wisdom of Crowds in Assessing Phishing Websites. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb Pharewell to Phishing. Search on Bibsonomy SSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Tjaart Steyn, Hennie A. Kruger, Lynette Drevin Identity Theft - Empirical evidence from a Phishing Exercise. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF phising, education, Identity theft, security awareness
37Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson Phoiling phishing. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Ka-Ping Yee, Kragen Sitaker Passpet: convenient password management and phishing protection. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Richard Clayton Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Rachna Dhamija, J. Doug Tygar The battle against phishing: Dynamic Security Skins. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Federico Maggi Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF phone phishing, measurements, phishing, social engineering
32Mariam Al-Hamar, Ray Dawson, Lin Guan A Culture of Trust Threatens Security and Privacy in Qatar. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Spear phishing, Phishing, E-mail, Identity theft, Penetration test
29Hossain Shahriar, Mohammad Zulkernine Information Source-Based Classification of Automatic Phishing Website Detectors. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Anti-phishing technique, information source
29Qingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan 0001, Peng Cheng 0011, Charles Chen New Anti-phishing Method with Two Types of Passwords in OpenID System. Search on Bibsonomy ICGEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Two passwords, Single sign on (SSO), OpenID, Anti-phishing
29Baber Aslam, Lei Wu, Cliff Changchun Zou PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. Search on Bibsonomy NCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF design, usability, Phishing, web security, password authentication, Pharming
Displaying result #1 - #100 of 2033 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license