Overview   Tree   Index 
Bibliography
PREV  NEXT FRAMES  NO FRAME 

Bibliography

2009
Aburrous M.R. et al."Modelling Intelligent Phishing Detection System for E-banking Using..."
(In proceedings)
Afroz S. et al."PhishZoo: An Automated Web Phishing Detection Approach Based on..."
(Technical report)
Böhme R. et al."The Iterated Weakest Link - A Model of Adaptive Security Investment"
(In proceedings)
Egelman S. et al."Timing is everything?: the effects of timing and placement of online..."
(In proceedings)
Knickbocker P. et al."Humboldt: A Distributed Phishing Disruption System"
(In proceedings)
Kumaraguru P. et al."School of Phish: A real-World Evaluation of Anti-Phishing Training"
(In proceedings)
Layton R. et al."Determining provenance in phishing websites using automated conceptual..."
(In proceedings)
Li S. et al."A Novel Anti-Phisihng Framework Based on Honeypots"
(In proceedings)
Ma L. et al."Establishing Phishing Provenance Using Orthographic Features"
(In proceedings)
Miyamoto D. et al."HumanBoost: Utilization of Users' Past Trust Decision for Identifying..."
(In proceedings)
Moore T. et al."Evil Searching: Compromise and Recompromise of Internet Hosts for..."
(In proceedings)
Moore T. et al."Temporal Correlations between Spam and Phishing Websites"
(In proceedings)
Moore T. et al."The Economics of Online Crime"
(Article)
Oiwa Y. et al."PAKE-based Mutual HTTP Authentication for Preventing Phishing Attacks"
(In proceedings)
Suriya R. et al."Establishing Phishing Provenance Using Orthographic Features"
(In proceedings)
Toolan F. et al."Phishing Detection Using Classifier Ensembles"
(In proceedings)
Wardman B. et al."Identifying Vulnerable Websites by Analysis of Common Strings in..."
(In proceedings)
Watters P.A."Why Do Users Trust The Wrong Messages? A Behavioural Model of Phishing"
(In proceedings)
Xiang G. et al."A Hybrid Phish Detection Approach by Identity Discovery and Keywords..."
(In proceedings)

2008
Aburrous M.R. et al."Intelligent Phishing Website Detection System using Fuzzy Techniques"
(In proceedings)
Basnet R. et al."Detection of Phishing Attacks: A Machine Learning Approach"
(Article)
Bergholz A. et al."Improved Phishing Detection using Model-Based Features"
(In proceedings)
Group A.P.W."Phishing Activity Trends Report - Q1, 2008"
('Miscellaneous document')
Miyamoto D. et al."An Evaluation of Machine Learning-based Methods for Detection of..."
(Article)
Moore T. et al."Evaluating the Wisdom of Crowds in Assessing Phishing Websites"
(In proceedings)
Moore T. et al."The Consequence of Non-Cooperation in the Fight Against Phishing"
(In proceedings)
US-CERT"Multiple DNS implementations vulnerable to cache poisoning"
('Miscellaneous document')
Www.us-Cert.gov"Quarterly Trends and Analysis Report"
(Technical report)
Zhou C.V. et al."A Self-healing, Self-protecting, Collaborative Intrusion Detection..."
(In proceedings)

2007
Abu-Nimeh S. et al."A Comparison of Machine Learning Techniques for Phishing Detection"
(In proceedings)
Anandpara V. et al."Phishing IQ Tests Measure Fear, Not Ability"
(In proceedings)
Asao H."Current situations of AML market"
('Miscellaneous document')
Birk D. et al."Phishing Phishers - Observing and Tracing Organized Cybercrime"
(In proceedings)
Com D.L.D."Phish Tank vs. Anti-Phishing Working Group"
('Miscellaneous document')
Evers J."Security Expert: User education is pointless"
('Miscellaneous document')
Fette I. et al."Learning to detect phishing emails"
(In proceedings)
Florêncio D.A.F. et al."A large-scale study of web password habits"
(In proceedings)
Florêncio D.A.F. et al."Evaluating a trial deployment of password re-use for phishing..."
(In proceedings)
Frye D.W."Email, Instant Messaging and Phishing"
(Book part)
Jagatic T.N. et al."Social Phishing"
(Article)
Jakobsson M. et al."What Instills Trust? A Qualitative Study of Phishing"
(In proceedings)
Karlof C. et al."Locked cookies: Web authentication security against phishing, pharm..."
(Technical report)
Kumaraguru P. et al."Protecting people from phishing: the design and evaluation of an..."
(In proceedings)
Kuo J."The Phishing of Children"
('Miscellaneous document')
Ludl C. et al."On the Effectiveness of Techniques to Detect Phishing Sites"
(In proceedings)
McCall T."Gartner Survey Shows Phishing Attacks Escalated in 2007; More than \$3..."
('Miscellaneous document')
Miyamoto D. et al."A Proposal of the AdaBoost-Based Detection of Phishing Sites"
(In proceedings)
Moore T. et al."Examining the Impact of Website Take-down on Phishing"
(In proceedings)
Oiwa Y. et al."PAKE-based mutual HTTP authentication for preventing phishing attacks"
(In proceedings)
Sheng S. et al."Anti-Phishing Phil: the design and evaluation of a game that teaches..."
(In proceedings)
Symantec"Drive-By Pharming: How Clicking on a Link Can Cost You Dearly"
('Miscellaneous document')
Tsow A."Phishing with Consumer Electronics - Malicious Home Routers"
(In proceedings)
Zhang Y. et al."CANTINA: A Content-Based Approach to Detect Phishing Web Sites"
(In proceedings)
Zhang Y. et al."Phinding Phish: Evaluating Anti-Phishing Tools"
(In proceedings)

2006
Dhamija R. et al."Why Phishing Works."
(In proceedings)
Downs J.S. et al."Decision strategies and susceptibility to phishing"
(In proceedings)
Ducklin P."CAN STRONG AUTHENTICATION SORT OUT PHISHING AND FRAUD ?"
(Technical report)
Florêncio D.A.F. et al."Analysis and Improvement of Anti-Phishing Schemes"
(In proceedings)
Florêncio D.A.F. et al."Password Rescue: A New Approach to Phishing Prevention"
(In proceedings)
Fu A.Y. et al."The methodology and an application to fight against Unicode attacks"
(In proceedings)
Jakobsson M. et al."Designing ethical phishing experiments: a study of (ROT13) rOnl query..."
(In proceedings)
Juels A. et al."Cache Cookies for Browser Authentication"
(In proceedings)
Karakasiliotis A. et al."Assessing end-user awareness of social engineering and phishing"
(In proceedings)
Kirda E. et al."Protecting Users against Phishing Attacks"
(Article)
Krammer V."Phishing Defense against IDN Address Spoofing Attacks"
(In proceedings)
Moshchuk A. et al."A crawler-based study of spyware on the Web"
(In proceedings)
Mosley D."Some Psychological Factors of Successful Phishing"
(Technical report)
Pan Y. et al."Anomaly Based Web Phishing Page Detection"
(In proceedings)
Wu M. et al."Do Security Toolbars Actually Prevent Phishing Attacks?"
(In proceedings)

2005
Andreolini M. et al."HoneySpam: honeypots fighting spam at the source"
(In proceedings)
Balfanz D. et al."Making the impossible easy: Usable PKI"
(Book part)
Dhamija R. et al."Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks"
(In proceedings)
Dhamija R. et al."Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks"
(In proceedings)
Dhamija R. et al."The Battle Against Phishing: Dynamic Security Skins"
(In proceedings)
Emigh A."Anti-Phishing Technology"
(Technical report)
Fu A.Y. et al."A Potential IRI based Phishing Strategy"
(In proceedings)
Jakobsson M. et al."Distributed phishing attacks"
(In proceedings)
Jakobsson M."Modeling and Preventing Phishing Attacks"
(In proceedings)
Kumar A."Phishing - A new age weapon"
(Technical report)
Kumaraguru P. et al."Trust modeling for online transactions: A phishing scenario"
(In proceedings)
McCall T. et al."Gartner Survey Shows Frequent Data Security Lapses and Increased Cyber..."
('Miscellaneous document')
Merwe (der) A.V. et al."Characteristics and Responsibilities Involved in a Phishing Attack"
(In proceedings)
Milletary J."Technical Trends in Phishing Attacks"
(Technical report)
Miyamoto D. et al."SPS: A Simple Filtering Algorithm Thwart Phishing Attacks"
(In proceedings)
Ollmann G."The Phishing Guide - Understanding & Preventing Phishing Attacks"
(Technical report)
Plössl K. et al."Protection Mechanisms against Phishing Attacks"
(In proceedings)
Ross B. et al."Stronger Password Authentication Using Browser Extensions"
(In proceedings)
Ye ((eileen)) Z. et al."Trusted Paths for Browsers"
(Article)

2004
Chou N. et al."Client-side defense against web-based identity theft"
(In proceedings)
Drake C.E. et al."Anatomy of a Phishing Email"
(In proceedings)
Herzberg A. et al."TrustBar: Protecting (even Naïve) Web Users from Spoofing and..."
(Technical report)
Tally G. et al."Anti-Phishing: Best Practices for Institutions and Consumers"
(Technical report)

2003
Doyle P. et al."Analysis of June 2003 survey on obstacles to PKI deployment and usage"
(Technical report)
Gutmann P."Plug-and-Play PKI: A PKI your Mother can Use"
(In proceedings)
Schwartz A."Why Am I Getting All This Spam?"
(Technical report)

2002
Fogg B.J. et al."How Do People Evaluate a Web Site's Credibility? Results from a Large..."
(Technical report)
Ye ((eileen)) Z. et al."Web Spoofing Revisited: SSL and Beyond"
(Technical report)

2001
Cialdini R.B."Influence: Science and Practice, 2nd Edition"
(Book)
Fu K. et al."Dos and don'ts of client authentication on the web"
(In proceedings)

2000
Phelps T.A. et al."Robust Hyperlinks: Cheap, Everywhere, Now"
(In proceedings)

1999
Whitten A. et al."Why Johnny Can't Encrypt"
(In proceedings)

1997
Felten E.W. et al."Web Spoofing: An Internet Con Game"
(Technical report)

Not dated
Blue Coat Systems I."spyware prevention - Blue Coat Systems. Inc. - proxy servers"
('Miscellaneous document')
F5 Networks I."TrafficShield Application Firewall"
('Miscellaneous document')
Group A.P.W."APWG: Committed to Wiping Out Internet Scams and Fraud"
('Miscellaneous document')
Inc. C."Cloudmark Anti-Fraud Toolbar"
('Miscellaneous document')
Inc. E."Earthlink Toolbar"
('Miscellaneous document')
Inc. G."TrustWatch Tool"
('Miscellaneous document')
Inc. (ebay)"Using eBay Tool's Account Guard"
('Miscellaneous document')
Krebs B."The New Face of Phishing"
('Miscellaneous document')
LTD. N."SSL's Credibility as Phishing Defense Is Tested"
('Miscellaneous document')
Ltd. C."Calling ID Toolbar"
('Miscellaneous document')
MillerSmiles.co.uk"PayPal Phishing Scams"
('Miscellaneous document')
NetEconomy"AML Compliance Sale Table"
('Miscellaneous document')
Netcraft"Netcraft Anti-Phishing Toolbar"
('Miscellaneous document')
OpenDNS"PhishTank - Join the fight against phishing"
('Miscellaneous document')
OpenDNS"Providing A Safer And Faster Internet"
('Miscellaneous document')
RSA Security I."America Online and RSA Security Launch AOL PassCode Premium Service"
('Miscellaneous document')
Robichaux P. et al."Gone Phishing: Evaluating Anti-Phishing Tools for Windows"
('Miscellaneous document')
Security P."Protecting Your Customers from Phishing Attacks: an Introduction to..."
('Miscellaneous document')
USA V."Verified by VISA"
('Miscellaneous document')
Waterken"Trust Management for Humans"
('Miscellaneous document')
Woelk B."RIT Information Security Advisory: Phone, E-mail, and IM/Social..."
('Miscellaneous document')

 Overview   Tree   Index 
Bibliography
PREV  NEXT FRAMES  NO FRAME 

Submit a bug

This document was generated by bib2html 5.1.
Copyright © 1998-2006 Stephane GALLAND (under the GNU General Public License)

Valid HTML 4.01!