Examining the effectiveness of phishing filters against DNS based phishing attacks
暂无分享,去创建一个
[1] Xi Chen,et al. Assessing the severity of phishing attacks: A hybrid data mining approach , 2011, Decis. Support Syst..
[2] Steven Furnell,et al. The irreversible march of technology , 2009, Inf. Secur. Tech. Rep..
[3] Amir Herzberg,et al. Security and identification indicators for browsers against spoofing and phishing attacks , 2008, TOIT.
[4] Adrian Perrig,et al. Phoolproof Phishing Prevention , 2006, Financial Cryptography.
[5] Dario Forte,et al. Phishing Attacks: Anatomy of a phishing attack: A high-level overview , 2009 .
[6] Markus Jakobsson,et al. What Instills Trust? A Qualitative Study of Phishing , 2007, Financial Cryptography.
[7] Swapan Purkait,et al. An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website , 2014, Inf. Manag. Comput. Secur..
[8] Xiaotie Deng,et al. An antiphishing strategy based on visual similarity assessment , 2006, IEEE Internet Computing.
[9] Suku Nair,et al. Bypassing Security Toolbars and Phishing Filters via DNS Poisoning , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[10] Swapan Purkait,et al. Exploring the Factors that Influence an Internet User's Ability to Correctly Identify Phishing Websites , 2012 .
[11] Swapan Purkait,et al. Information Management & Computer Security Phishing counter measures and their effectiveness – literature review , 2016 .
[12] Swapan Purkait,et al. Virtual Browser: An On-Demand Service to Prevent Phishing Attacks , 2012 .
[13] Xin Luo,et al. How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model , 2012, 2012 45th Hawaii International Conference on System Sciences.
[14] B. J. Fogg,et al. What makes Web sites credible?: a report on a large quantitative study , 2001, CHI.
[15] Markus Jakobsson,et al. Why and How to Perform Fraud Experiments , 2008, IEEE Security & Privacy.
[16] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[17] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[18] Lorrie Faith Cranor,et al. Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.
[19] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[20] Linfeng Li,et al. Usability evaluation of anti-phishing toolbars , 2007, Journal in Computer Virology.
[21] Amir Herzberg,et al. Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..
[22] Elizabeth Sillence,et al. It won't happen to me: Promoting secure behaviour among internet users , 2010, Comput. Hum. Behav..
[23] S. Furnell. Phishing: can we spot the signs? , 2007 .
[24] Elizabeth V. Mulig,et al. PHISHING, PHARMING AND IDENTITY THEFT , 2007 .
[25] JungMin Kang,et al. Advanced White List Approach for Preventing Access to Phishing Sites , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[26] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[27] Philip Hunter,et al. 2005 IT security highlights - the day of the amateur hacker has gone, but there are still plenty of amateur users… , 2006 .
[28] Mohsen Sharifi,et al. A phishing sites blacklist generator , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[29] Maria Papadaki,et al. Social engineering: assessing vulnerabilities in practice , 2009, Inf. Manag. Comput. Secur..