Columns on Last Page Should Be Made As Close As Possible to Equal Length

In this paper, we describe the formatting guidelines for ACM SIG Proceedings.

[1]  A. Z. Spector,et al.  Achieving application requirements , 1990 .

[2]  Larry L. Peterson,et al.  Reasoning about naming systems , 1993, TOPL.

[3]  Michael Sannella,et al.  Constraint satisfaction and debugging for interactive user interfaces , 1994 .

[4]  Gary Marchionini,et al.  A study on video browsing strategies , 1997 .

[5]  Bernd Fröhlich,et al.  The cubic mouse: a new device for three-dimensional input , 2000, CHI.

[6]  George Forman,et al.  An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..

[7]  Hong Hua,et al.  A widget framework for augmented interaction in SCAPE , 2003, UIST '03.

[8]  Avivah Litan Phishing Attack Victims Likely Targets for Identity Theft , 2005 .

[9]  Lorrie Faith Cranor,et al.  Decision strategies and susceptibility to phishing , 2006, SOUPS '06.

[10]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[11]  P. Coulton,et al.  Columns on Last Page Should Be Made As Close As Possible to Equal Length , 2006 .

[12]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[13]  Markus Jakobsson,et al.  Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .

[14]  Yuen-Tak Yu,et al.  A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions , 2006, J. Syst. Softw..

[15]  Stefan Görling,et al.  An overview of the Sender Policy Framework (SPF) as an anti-phishing mechanism , 2007, Internet Res..

[16]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .

[17]  Lorrie Faith Cranor,et al.  Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.

[18]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[19]  Niels Provos,et al.  A framework for detection and measurement of phishing attacks , 2007, WORM '07.

[20]  Lorrie Faith Cranor,et al.  Getting users to pay attention to anti-phishing education: evaluation of retention and transfer , 2007, eCrime '07.

[21]  Desney S. Tan,et al.  An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks , 2007, Financial Cryptography.

[22]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.

[23]  Tyler Moore,et al.  Examining the impact of website take-down on phishing , 2007, eCrime '07.

[24]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[25]  Cormac Herley,et al.  A profitless endeavor: phishing as tragedy of the commons , 2009, NSPW '08.

[26]  Christopher Krügel,et al.  There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits , 2008, WOOT.

[27]  Lorrie Faith Cranor,et al.  Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.

[28]  Lorrie Faith Cranor,et al.  An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.

[29]  Cormac Herley,et al.  Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy , 2009, WEIS.

[30]  Jason I. Hong,et al.  A hybrid phish detection approach by identity discovery and keywords retrieval , 2009, WWW '09.

[31]  Carolyn Penstein Rosé,et al.  A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection , 2010, ESORICS.

[32]  Ponnurangam Kumaraguru,et al.  Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.

[33]  Lorrie Faith Cranor,et al.  Teaching Johnny not to fall for phish , 2010, TOIT.

[34]  Philip Tavel,et al.  Modeling and Simulation Design , 2011 .