A policy analysis of phishing countermeasures
暂无分享,去创建一个
[1] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[2] Tyler Moore,et al. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing , 2009, Financial Cryptography.
[3] Lorrie Faith Cranor,et al. Protecting people from phishing: the design and evaluation of an embedded training email system , 2007, CHI.
[4] Jason I. Hong,et al. A hybrid phish detection approach by identity discovery and keywords retrieval , 2009, WWW '09.
[5] Niels Provos,et al. A framework for detection and measurement of phishing attacks , 2007, WORM '07.
[6] Richard E. Mayer,et al. Multimedia Learning , 2001, Visible Learning Guide to Student Achievement.
[7] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[8] Sean W. Smith,et al. Trusted paths for browsers , 2002, TSEC.
[9] Huseyin Cavusoglu,et al. Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..
[10] Ponnurangam Kumaraguru,et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.
[11] Lorrie Faith Cranor,et al. A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.
[12] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[13] Lorrie Faith Cranor,et al. Teaching Johnny not to fall for phish , 2010, TOIT.
[14] Stefan Gorling,et al. The Myth of User Education , 2006 .
[15] Lorrie Faith Cranor,et al. Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.
[16] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[17] D. Mackinnon,et al. Estimating Mediated Effects in Prevention Studies , 1993 .
[18] Tyler Moore,et al. Temporal Correlations between Spam and Phishing Websites , 2009, LEET.
[19] A. Emigh,et al. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .
[20] Suku Nair,et al. A comparison of machine learning techniques for phishing detection , 2007, eCrime '07.
[21] J. Santelli,et al. Adolescent health : understanding and preventing risk behaviors , 2009 .
[22] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] Min Wu,et al. Web wallet: preventing phishing attacks by revealing user intentions , 2006, SOUPS '06.
[24] Tim Berners-Lee,et al. Uniform Resource Locators , 1994 .
[25] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[26] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[27] Lorrie Faith Cranor,et al. Decision strategies and susceptibility to phishing , 2006, SOUPS '06.
[28] Gary Klein,et al. Sources of Power: How People Make Decisions , 2017 .
[29] Lorrie Faith Cranor,et al. Improving phishing countermeasures: An analysis of expert interviews , 2009, 2009 eCrime Researchers Summit.
[30] Clark N Quinn,et al. Engaging Learning: Designing e-Learning Simulation Games , 2005 .
[31] Markus Jakobsson,et al. Invasive browser sniffing and countermeasures , 2006, WWW '06.
[32] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[33] James C. Lester,et al. The Case for Social Agency in Computer-Based Teaching: Do Students Learn More Deeply When They Interact With Animated Pedagogical Agents? , 2001 .
[34] Norman M. Sadeh,et al. Learning to detect phishing emails , 2007, WWW '07.
[35] Christopher Krügel,et al. On the Effectiveness of Techniques to Detect Phishing Sites , 2007, DIMVA.
[36] Tyler Moore,et al. The consequence of non-cooperation in the fight against phishing , 2008, 2008 eCrime Researchers Summit.
[37] Bruce Schneier,et al. Inside risks: semantic network attacks , 2000, CACM.
[38] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[39] Michael P. Gallaher,et al. Private Sector Cyber Security Investment: An Empirical Analysis , 2006, WEIS.
[40] Neil Salkind. Encyclopedia of Measurement and Statistics , 2006 .
[41] Adrian Perrig,et al. Phoolproof Phishing Prevention , 2006, Financial Cryptography.
[42] V. Reyna,et al. Risk and Rationality in Adolescent Decision Making , 2006, Psychological science in the public interest : a journal of the American Psychological Society.
[43] E. Weber,et al. A Domain-Specific Risk-Taking (DOSPERT) Scale for Adult Populations , 2006, Judgment and Decision Making.
[44] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[45] Hiroshi Nakajima,et al. We learn better together: enhancing eLearning with emotional characters , 2005, CSCL.
[46] Cormac Herley,et al. A profitless endeavor: phishing as tragedy of the commons , 2009, NSPW '08.
[47] M. Eric Johnson,et al. Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm , 2005, WEIS.
[48] Lorrie Faith Cranor,et al. Cantina: a content-based approach to detecting phishing web sites , 2007, WWW '07.
[49] Paul C. van Oorschot,et al. On instant messaging worms, analysis and countermeasures , 2005, WORM '05.
[50] Amir Herzberg,et al. Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites , 2004 .
[51] Xuhua Ding,et al. Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[52] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[53] James Paul Gee,et al. What video games have to teach us about learning and literacy , 2007, CIE.
[54] Lorrie Faith Cranor,et al. An Empirical Analysis of Phishing Blacklists , 2009, CEAS 2009.
[55] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[56] Ka-Ping Yee,et al. Passpet: convenient password management and phishing protection , 2006, SOUPS '06.
[57] Kristopher J Preacher,et al. Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models , 2008, Behavior research methods.
[58] K. Koedinger,et al. Comparing Instructional Strategies for Integrating Conceptual and Procedural Knowledge. , 2002 .
[59] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[60] Lorrie Faith Cranor,et al. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer , 2007, eCrime '07.
[61] Eric A. Posner,et al. Holding Internet Service Providers Accountable , 2006, Supreme Court Economic Review.
[62] Alexander Repenning,et al. Playing a Game: The Ecology of Designing, Building and Testing Games as Educational Activities , 2005 .
[63] Aaron Emigh. The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond , 2006, J. Digit. Forensic Pract..