Socio-technological phishing prevention
暂无分享,去创建一个
[1] Paul A. Watters,et al. Why do users trust the wrong messages? A behavioural model of phishing , 2009, 2009 eCrime Researchers Summit.
[2] Markus Jakobsson,et al. Phishing IQ Tests Measure Fear, Not Ability , 2007, Financial Cryptography.
[3] Mohamed G. Gouda,et al. Pharewell to Phishing , 2008, SSS.
[4] Duminda Wijesekera,et al. An Intrusion Detection System for Detecting Phishing Attacks , 2007, Secure Data Management.
[5] Rolf Oppliger,et al. Effective Protection Against Phishing and Web Spoofing , 2005, Communications and Multimedia Security.
[6] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[7] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[8] Richard Clayton,et al. Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) , 2005, Security Protocols Workshop.
[9] Steven J. Murdoch,et al. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication , 2010, Financial Cryptography.
[10] Christopher Soghoian. Legal risks for phishing researchers , 2008 .
[11] Shinta Nakayama,et al. Preventing False Positives in Content-Based Phishing Detection , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.