|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 428 occurrences of 209 keywords
|
|
|
Results
Found 2033 publication records. Showing 2033 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
218 | Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad |
Phishing IQ Tests Measure Fear, Not Ability. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
phishing education, phishing IQ test, phishing |
193 | Linfeng Li, Marko Helenius |
Usability evaluation of anti-phishing toolbars. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
193 | André Bergholz |
AntiPhish: lessons learnt. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
|
181 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
A phishing vulnerability analysis of web based systems. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
165 | Troy Ronda, Stefan Saroiu, Alec Wolman |
Itrustpage: a user-assisted anti-phishing tool. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
phishing, anti-phishing |
134 | Rhiannon Weaver, M. Patrick Collins |
Fishing for phishes: applying capture-recapture methods to estimate phishing populations. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
|
133 | Christian Ludl, Sean McAllister, Engin Kirda, Christopher Kruegel |
On the Effectiveness of Techniques to Detect Phishing Sites. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
121 | Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani |
PhishCatch - A Phishing Detection Tool. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
121 | Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen |
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
121 | Chuan Yue, Haining Wang |
Anti-Phishing in Offense and Defense. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
113 | Tyler Moore 0001, Richard Clayton 0001 |
Examining the impact of website take-down on phishing. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
electronic crime, phishing, security economics |
113 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor |
Behavioral response to phishing risk. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
survey, phishing |
113 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security |
113 | R. Suriya, K. Saravanan, Arunkumar Thangavelu |
An integrated approach to detect phishing mail attacks: a case study. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
code script checker, domain name checker, linkguard, phishing |
113 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
101 | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham |
School of phish: a real-word evaluation of anti-phishing training. |
SOUPS |
2009 |
DBLP DOI BibTeX RDF |
embedded training, real-world studies, email, phishing, usable privacy and security |
97 | Peter Likarish, Eunjin Jung, Donald E. Dunbar, Thomas E. Hansen, Juan Pablo Hourcade |
B-APT: Bayesian Anti-Phishing Toolbar. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
97 | Abdullah M. Alnajim, Malcolm Munro |
An evaluation of users' tips effectiveness for Phishing websites detection. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
97 | Dinei A. F. Florêncio, Cormac Herley |
Analysis and Improvement of Anti-Phishing Schemes. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
93 | Yue Zhang 0002, Jason I. Hong, Lorrie Faith Cranor |
Cantina: a content-based approach to detecting phishing web sites. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
toolbar, evaluation, phishing, TF-IDF, anti-phishing |
89 | Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang 0001, Suku Nair |
A comparison of machine learning techniques for phishing detection. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
BART, NNet, machine learning, classification, SVM, logistic regression, phishing, random forests, CART |
89 | Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs |
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
roleplay, survey, phishing, user behavior, social engineering, mechanical turk |
89 | Ye Cao, Weili Han, Yueran Le |
Anti-phishing based on automated individual white-list. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
anti-pharming, individual white-list, login user interface, na?ve bayesian classifier, anti-phishing |
89 | Ian Fette, Norman M. Sadeh, Anthony Tomasic |
Learning to detect phishing emails. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
semantic attacks, learning, filtering, spam, email, phishing |
89 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
89 | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
development and testing, learning science, security user education, game design, phishing, interactive learning, usable privacy and security |
88 | Stefan A. Robila, James W. Ragucci |
Don't be a phish: steps in user education. |
ITiCSE |
2006 |
DBLP DOI BibTeX RDF |
education, information security, phishing, computer education |
85 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Bryan Parno, Cynthia Kuo, Adrian Perrig |
Phoolproof Phishing Prevention. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
85 | Ying Pan, Xuhua Ding |
Anomaly Based Web Phishing Page Detection. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
85 | Rachna Dhamija, J. D. Tygar, Marti A. Hearst |
Why phishing works. |
CHI |
2006 |
DBLP DOI BibTeX RDF |
phishing user study, why phishing works, phishing, security usability |
77 | Serge Egelman, Lorrie Faith Cranor, Jason I. Hong |
You've been warned: an empirical study of the effectiveness of web browser phishing warnings. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
warning messages, phishing, mental models, usable privacy and security |
77 | Anthony Y. Fu, Xiaotie Deng, Wenyin Liu |
A Potential IRI Based Phishing Strategy. |
WISE |
2005 |
DBLP DOI BibTeX RDF |
Internationalized Resource Identifier (IRI), Internet security, Anti-phishing |
77 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Min Zhang, Xiaotie Deng |
Detection of phishing webpages based on visual similarity. |
WWW (Special interest tracks and posters) |
2005 |
DBLP DOI BibTeX RDF |
web document analysis, information filtering, anti-phishing, visual similarity |
77 | Engin Kirda, Christopher Krügel |
Protecting Users Against Phishing Attacks with AntiPhish. |
COMPSAC (1) |
2005 |
DBLP DOI BibTeX RDF |
Phishing Attacks, User Protection, Security |
77 | Wenyin Liu, Guanglin Huang, Xiaoyue Liu 0004, Xiaotie Deng, Min Zhang |
Phishing Webpage Detection. |
ICDAR |
2005 |
DBLP DOI BibTeX RDF |
Web document analysis, Information filtering, Anti-Phishing |
73 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Wilfried N. Gansterer, David Pölz |
E-Mail Classification for Phishing Defense. |
ECIR |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Stephan Kubisch, Harald Widiger, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim |
Method for Evaluating the Security Risk of a Website Against Phishing Attacks. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya |
PHONEY: Mimicking User Response to Detect Phishing Attacks. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Indranil Bose, Alvin Chung Man Leung |
Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks? |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
65 | Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa |
Online phishing classification using adversarial data mining and signaling games. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering |
65 | Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge |
Protecting people from phishing: the design and evaluation of an embedded training email system. |
CHI |
2007 |
DBLP DOI BibTeX RDF |
embedded training, email, phishing, situated learning, usable privacy and security |
65 | Willy Susilo, Yi Mu 0001 |
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
repudiable, authentication, email, phishing, separable, ID-based, deniable |
65 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor |
Decision strategies and susceptibility to phishing. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
phishing, mental models, qualitative methods |
65 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
64 | Guang Xiang, Jason I. Hong |
A hybrid phish detection approach by identity discovery and keywords retrieval. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, named entity recognition, anti-phishing |
61 | Giovane Cesar Moreira Moura, Aiko Pras |
Scalable Detection and Isolation of Phishing. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung |
Detection of Phishing Attacks: A Machine Learning Approach. |
Soft Computing Applications in Industry |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Yongdong Wu, Haixia Yao, Feng Bao 0001 |
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Mohsen Sharifi, Seyed Hossein Siadati |
A phishing sites blacklist generator. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth |
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Chik How Tan, Joseph Chee Ming Teo |
Protection AgainstWeb-based Password Phishing. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas |
An Intrusion Detection System for Detecting Phishing Attacks. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Anthony Y. Fu, Liu Wenyin, Xiaotie Deng |
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Antiphishing, visual assessment, Earth Mover's Distance |
61 | Min Wu 0005, Robert C. Miller, Greg Little |
Web wallet: preventing phishing attacks by revealing user intentions. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user study, user interface design, world wide web and hypermedia |
61 | Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi |
SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks. |
AINTEC |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Abdullah M. Alnajim, Malcolm Munro |
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
anti-Phishing countermeasures, online fraud, online banking security, Phishing, e-commerce security |
53 | Dinei A. F. Florêncio, Cormac Herley |
Evaluating a trial deployment of password re-use for phishing prevention. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
authentication, access control, passwords, phishing |
53 | Debra L. Cook, Vijay K. Gurbani, Michael Daniluk |
Phishwish: A Stateless Phishing Filter Using Minimal Rules. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
filters, email, phishing |
53 | Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim |
What Instills Trust? A Qualitative Study of Phishing. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
stimuli, design, authenticity, user interface design, experiment, email, phishing, psychology, web pages, think-aloud |
53 | Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim |
Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
Phishing, Social engineering, Security Mechanism |
53 | Markus Jakobsson, Jacob Ratkiewicz |
Designing ethical phishing experiments: a study of (ROT13) rOnl query features. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
security, experiment, ethical, phishing, accurate |
53 | Charles Ohaya |
Managing phishing threats in an organization. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
security, phishing |
53 | Greg Goth |
Phishing Attacks Rising, But Dollar Losses Down. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
phishing attacks, zombie machines |
52 | Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone |
SC@CCO: a Graphic-Based Authentication System. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password |
52 | Ben Adida |
Beamauth: two-factor web authentication with a bookmark. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
phishing, web security, two-factor authentication |
49 | HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song |
A New Anti-phishing Method in OpenID. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bidgoli |
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods. |
Web Intelligence/IAT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Craig M. McRae, Rayford B. Vaughn |
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Min Wu 0005, Robert C. Miller, Simson L. Garfinkel |
Do security toolbars actually prevent phishing attacks? |
CHI |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user study, user interface design, world wide web and hypermedia |
49 | Markus Jakobsson |
Modeling and Preventing Phishing Attacks. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Rachna Dhamija, J. D. Tygar |
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. |
HIP |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Nuttapong Sanglerdsinlapachai, Arnon Rungsawang |
Using Domain Top-page Similarity Feature in Machine Learning-Based Web Phishing Detection. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
domain top-page, machine learning, semantic similarity, phishing, anti-phishing |
45 | Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi |
A Proactive Approach to Preventing Phishing Attacks Using Pshark. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Phishing e-mail, whois database, Pshark, Anti-phishing |
41 | Viktor Krammer |
Phishing defense against IDN address spoofing attacks. |
PST |
2006 |
DBLP DOI BibTeX RDF |
usability, web browsers, phishing, internet security, unicode, internationalized domain names |
40 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. |
SIGACT News |
2007 |
DBLP DOI BibTeX RDF |
decisional, doppelganger, static diffie-hellman, user interfaces, phishing, oblivious transfer, password authenticated key exchange |
40 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
decisional & static diffie-hellman assumption, user interfaces, authentication, phishing, oblivious transfer, password authenticated key exchange |
40 | Wenyin Liu, Xiaotie Deng, Guanglin Huang, Anthony Y. Fu |
An Antiphishing Strategy Based on Visual Similarity Assessment. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
Security and Trust, Anti-Phishing, Visual Similarity |
40 | Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little |
The methodology and an application to fight against Unicode attacks. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
secure web identity, spam, phishing, Unicode |
37 | Rasha Zieni, Luisa Massari, Maria Carla Calzarossa |
Phishing or Not Phishing? A Survey on the Detection of Phishing Websites. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
37 | Rubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001 |
How persuasive is a phishing email? A phishing game for phishing awareness. |
J. Comput. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Mahmoud Khonji, Andrew Jones 0002, Youssef Iraqi |
A study of feature subset evaluators and feature subset searching methods for phishing classification. |
CEAS |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Amir Herzberg |
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Hicham Tout, William Hafner |
Phishpin: An Identity-Based Anti-phishing Approach. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Tyler Moore 0001, Richard Clayton 0001 |
Evaluating the Wisdom of Crowds in Assessing Phishing Websites. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Taehwan Choi, Sooel Son, Mohamed G. Gouda, Jorge Arturo Cobb |
Pharewell to Phishing. |
SSS |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Tjaart Steyn, Hennie A. Kruger, Lynette Drevin |
Identity Theft - Empirical evidence from a Phishing Exercise. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
phising, education, Identity theft, security awareness |
37 | Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson |
Phoiling phishing. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Ka-Ping Yee, Kragen Sitaker |
Passpet: convenient password management and phishing protection. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Richard Clayton |
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Rachna Dhamija, J. Doug Tygar |
The battle against phishing: Dynamic Security Skins. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Federico Maggi |
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
phone phishing, measurements, phishing, social engineering |
32 | Mariam Al-Hamar, Ray Dawson, Lin Guan |
A Culture of Trust Threatens Security and Privacy in Qatar. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Spear phishing, Phishing, E-mail, Identity theft, Penetration test |
29 | Hossain Shahriar, Mohammad Zulkernine |
Information Source-Based Classification of Automatic Phishing Website Detectors. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
Anti-phishing technique, information source |
29 | Qingxiang Feng, Kuo-Kun Tseng, Jeng-Shyang Pan 0001, Peng Cheng 0011, Charles Chen |
New Anti-phishing Method with Two Types of Passwords in OpenID System. |
ICGEC |
2011 |
DBLP DOI BibTeX RDF |
Two passwords, Single sign on (SSO), OpenID, Anti-phishing |
29 | Baber Aslam, Lei Wu, Cliff Changchun Zou |
PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks. |
NCA |
2010 |
DBLP DOI BibTeX RDF |
design, usability, Phishing, web security, password authentication, Pharming |
Displaying result #1 - #100 of 2033 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|