Examining the impact of website take-down on phishing
暂无分享,去创建一个
[1] Robert E. Mullen,et al. The lognormal distribution of software failure rates: application to software reliability growth modeling , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).
[2] Robert E. Mullen,et al. The lognormal distribution of software failure rates: origin and evidence , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).
[3] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[4] Jonathan J. Oliver,et al. Anatomy of a Phishing Email , 2004, CEAS.
[5] Xiaotie Deng,et al. Detection of phishing webpages based on visual similarity , 2005, WWW '05.
[6] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[7] Daisuke Miyamoto,et al. SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks , 2005, AINTEC.
[8] Lorrie Faith Cranor,et al. Phinding Phish: Evaluating Anti-Phishing Tools , 2006 .
[9] John S. Quarterman. PhishScope: Tracking Phish Server Clusters , 2006, J. Digit. Forensic Pract..
[10] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[11] L. Jean Camp,et al. Reliable, Usable Signaling to Defeat Masquerade Attacks , 2006, WEIS.
[12] Xuhua Ding,et al. Anomaly Based Web Phishing Page Detection , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[13] Markus Jakobsson,et al. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .
[14] Rob Thomas,et al. The underground economy: priceless , 2006 .
[15] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Stuart E. Schechter,et al. The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .
[17] Paul Ohm. The Myth of the Superuser: Fear, Risk, and Harm Online , 2007 .