|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 157 publication records. Showing 157 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Tyler Moore 0001, Richard Clayton 0001 |
Which malware lures work best? Measurements from a large instant messaging worm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015, pp. 69-78, 2015, IEEE, 978-1-4799-8909-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Johnson 0002, Nikolaos Kiourtis, Angelos Stavrou, Vincent Sritapan |
Analysis of content copyright infringement in mobile application markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015, pp. 43-52, 2015, IEEE, 978-1-4799-8909-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![IEEE, 978-1-4799-8909-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Jonathan M. Spring, Sarah Kern, Alec Summers |
Global adversarial capability modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015, pp. 22-42, 2015, IEEE, 978-1-4799-8909-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vaibhav Garg, L. Jean Camp |
Spare the rod, spoil the network security? Economic analysis of sanctions online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2015 APWG Symposium on Electronic Crime Research, eCrime 2015, Barcelona, Spain, May 26-29, 2015, pp. 59-68, 2015, IEEE, 978-1-4799-8909-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Neha Gupta 0005, Anupama Aggarwal, Ponnurangam Kumaraguru |
bit.ly/malicious: Deep dive into short URL based e-crime detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014, pp. 14-24, 2014, IEEE, 978-1-4799-6509-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Srishti Gupta, Ponnurangam Kumaraguru |
Emerging phishing trends and effectiveness of the anti-phishing landing page. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014, pp. 36-47, 2014, IEEE, 978-1-4799-6509-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![IEEE, 978-1-4799-6509-0 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Jackie Jones, Damon McCoy |
The check is in the mail: Monetization of Craigslist buyer scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014, pp. 25-35, 2014, IEEE, 978-1-4799-6509-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Prateek Dewan, Anand Kashyap, Ponnurangam Kumaraguru |
Analyzing social and stylometric features to identify spear phishing emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014, pp. 1-13, 2014, IEEE, 978-1-4799-6509-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jens Neisius, Richard Clayton 0001 |
Orchestrated crime: The high yield investment fraud ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2014 APWG Symposium on Electronic Crime Research, eCrime 2014, Birmingham, AL, USA, September 23-25, 2014, pp. 48-58, 2014, IEEE, 978-1-4799-6509-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. Spring |
Modeling malicious domain name take-down dynamics: Why eCrime pays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-9, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aunshul Rege |
10v3.c0ns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-9, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guang-Gang Geng, Xiao-Dong Lee, Wei Wang 0083, Shian-Shyong Tseng |
Favicon - a clue to phishing sites detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-10, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas J. Holt, Yi Ting Chua 0001, Olga Smirnova |
An exploration of the factors affecting the advertised price for stolen data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-10, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Brad Wardman, Lisa Kelly, Michael Weideman |
Voice of the customer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-7, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sadia Afroz 0001, Vaibhav Garg, Damon McCoy, Rachel Greenstadt |
Honor among thieves: A common's analysis of cybercrime economies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-11, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan M. Spring |
A notation for describing the steps in indicator expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-6, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![IEEE, 978-1-4799-1158-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle |
Password advice shouldn't be boring: Visualizing password guessing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-11, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marie Vasek, Tyler Moore 0001 |
Empirical analysis of factors affecting malware URL detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-8, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aditi Gupta 0003, Hemank Lamba, Ponnurangam Kumaraguru |
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-12, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Malte Möser, Rainer Böhme, Dominic Breuker |
An inquiry into money laundering tools in the Bitcoin ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-14, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Karami, Shiva Ghaemi, Damon McCoy |
Folex: An analysis of an herbal and counterfeit luxury goods affiliate program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-9, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shams Zawoad, Amit Kumar Dutta, Alan P. Sprague, Ragib Hasan, Jason Britt, Gary Warner |
Phish-Net: Investigating phish clusters using drop email addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-13, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dhia Mahjoub |
Monitoring a fast flux botnet using recursive and passive DNS: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2013 APWG eCrime Researchers Summit, eCrime 2013, San Francisco, CA, USA, September 17-18, 2013, pp. 1-9, 2013, IEEE, 978-1-4799-1158-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2012 eCrime Researchers Summit, eCrime 2012, Las Croabas, PR, USA, October 23-24, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![IEEE, 978-1-4673-2544-8 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Wei Gao, Thomas H. Morris, Bradley Reaves, Drew Richey |
On SCADA control system command and response injection and intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-9, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Robert Layton, Paul A. Watters, Richard Dazeley |
Automatically determining phishing campaigns using the USCAP methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-8, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marco Riccardi, David Oro, Jesus Luna, Marco Cremonini, Marc Vilanova |
A framework for financial botnet analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Brian K. Tanner, Gary Warner, Henry Stern, Scott Olechowski |
Koobface: The evolution of the social botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-10, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sangita Pillay, Thamar Solorio |
Authorship attribution of web forum posts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fergus Toolan, Joe Carthy |
Feature selection for Spam and Phishing detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-12, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Seckin Anil Unlu, Kemal Bicakci |
NoTabNab: Protection against the "tabnabbing attack". ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-5, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sean M. Zadig, Gurvirender P. Tejay |
Securing IS assets through hacker deterrence: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010, pp. 1-7, 2010, IEEE, 978-1-4244-7760-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | |
2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October 18-20, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![IEEE, 978-1-4244-7760-9 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Liping Ma, John Yearwood, Paul A. Watters |
Establishing phishing provenance using orthographic features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-10, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Paul Knickerbocker, Dongting Yu, Jun Li 0001 |
Humboldt: A distributed phishing disruption system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-12, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fergus Toolan, Joe Carthy |
Phishing detection using classifier ensembles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-9, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Onook Oh, Rajarshi Chakraborty, H. Raghav Rao, Shambhu J. Upadhyaya |
An exploration of unintended online private information disclosure in educational institutions across four countries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-11, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Watters |
Why do users trust the wrong messages? A behavioural model of phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-7, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Steve Sheng, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Improving phishing countermeasures: An analysis of expert interviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-15, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mina Guirguis, Jason Valdez, Bassam El Lababedi, Joseph Valdez |
Burn Before Reading: A stealthy framework for combating live forensics examinations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-10, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![IEEE, 978-1-4244-4625-4 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Brad Wardman, Gaurang Shukla, Gary Warner |
Identifying vulnerable websites by analysis of common strings in phishing URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-13, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bradley Reaves, Thomas H. Morris |
Discovery, infiltration, and denial of service in a process control system wireless network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-9, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shujun Li, Roland Schmitz |
A novel anti-phishing framework based on honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-13, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Robert Layton, Paul A. Watters |
Determining provenance in phishing websites using automated conceptual analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009, pp. 1-7, 2009, IEEE, 978-1-4244-4625-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tyler Moore 0001, Richard Clayton 0001 |
The consequence of non-cooperation in the fight against phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-14, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Malte Hesse, Norbert Pohlmann |
Internet Situation Awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-9, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Lessons from a real world evaluation of anti-phishing training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-12, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Danesh Irani, Steve Webb, Jonathon Giffin, Calton Pu |
Evolutionary study of phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-10, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Brad Wardman, Gary Warner |
Automating phishing website identification through deep MD5 matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-7, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Soghoian |
Legal risks for phishing researchers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-11, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Steven A. Myers, Sid Stamm |
Practice & prevention of home-router mid-stream injection attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-14, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | |
2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![IEEE, 978-1-4244-2969-1 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang 0001, Suku Nair |
A distributed architecture for phishing detection using Bayesian Additive Regression Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008, pp. 1-10, 2008, IEEE, 978-1-4244-2969-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #157 of 157 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|