Analysis and Prevention of Phishing Attacks in Cyber Space
暂无分享,去创建一个
Alekha Kumar Mishra | Asis Kumar Tripathy | Satyabrata Swain | Alekh Kumar Mishra | A. Tripathy | S. Swain
[1] Jemal H. Abawajy,et al. User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..
[2] Gaurav,et al. Anti-Phishing Techniques : A Review , 2022 .
[3] Huajun Huang,et al. Browser-Side Countermeasures for Deceptive Phishing Attack , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[4] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[5] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[6] Jason Hong,et al. The state of phishing attacks , 2012, Commun. ACM.
[7] Christopher Krügel,et al. Protecting Users against Phishing Attacks , 2006, Comput. J..
[8] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[9] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[10] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[11] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[12] Bimal Parmar,et al. Protecting against spear-phishing , 2012 .
[13] Ponnurangam Kumaraguru,et al. Emerging phishing trends and effectiveness of the anti-phishing landing page , 2014, 2014 APWG Symposium on Electronic Crime Research (eCrime).
[14] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[15] Xiaotie Deng,et al. Detection of phishing webpages based on visual similarity , 2005, WWW '05.
[16] Eric Medvet,et al. Visual-similarity-based phishing detection , 2008, SecureComm.
[17] Lorrie Faith Cranor,et al. Lessons from a real world evaluation of anti-phishing training , 2008, 2008 eCrime Researchers Summit.
[18] Junshan Tan,et al. Countermeasure Techniques for Deceptive Phishing Attack , 2009, 2009 International Conference on New Trends in Information and Service Science.
[19] Adrian Perrig,et al. Phoolproof Phishing Prevention , 2006, Financial Cryptography.
[20] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[21] Nasir D. Memon,et al. Phishing, Personality Traits and Facebook , 2013, ArXiv.
[22] Anthony Skjellum,et al. High-performance content-based phishing attack detection , 2011, 2011 eCrime Researchers Summit.
[23] Murray S. Kucherawy. DomainKeys Identified Mail (DKIM) and Mailing Lists , 2011, RFC.