The state of phishing attacks
暂无分享,去创建一个
[1] Martin R. Gibbs,et al. Mediating intimacy: designing technologies to support strong-tie relationships , 2005, CHI.
[2] Avivah Litan. Phishing Attack Victims Likely Targets for Identity Theft , 2005 .
[3] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[4] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[5] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[6] Markus Jakobsson,et al. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .
[7] Stefan Görling,et al. An overview of the Sender Policy Framework (SPF) as an anti-phishing mechanism , 2007, Internet Res..
[8] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Stuart E. Schechter,et al. The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .
[10] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[11] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[12] Stefan Gorling,et al. An overview of the Sender Policy Framework (SPF) as an anti‐phishing mechanism , 2007 .
[13] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[14] Lorrie Faith Cranor,et al. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer , 2007, eCrime '07.
[15] Desney S. Tan,et al. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks , 2007, Financial Cryptography.
[16] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[17] Suku Nair,et al. A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.
[18] Tyler Moore,et al. Examining the impact of website take-down on phishing , 2007, eCrime '07.
[19] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[20] Cormac Herley,et al. Phishing as a Tragedy of the Commons , 2008 .
[21] Cormac Herley,et al. A profitless endeavor: phishing as tragedy of the commons , 2009, NSPW '08.
[22] Christopher Krügel,et al. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.
[23] Lorrie Faith Cranor,et al. Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.
[24] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[25] Cormac Herley,et al. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy , 2009, WEIS.
[26] Jason I. Hong,et al. A hybrid phish detection approach by identity discovery and keywords retrieval , 2009, WWW '09.
[27] Carolyn Penstein Rosé,et al. A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection , 2010, ESORICS.
[28] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[29] Lorrie Faith Cranor,et al. Teaching Johnny not to fall for phish , 2010, TOIT.
[30] Frank Stajano,et al. Understanding scam victims , 2011, Commun. ACM.